计算机科学
认证(法律)
计算机安全
加密
撤销
身份管理
计算机网络
身份(音乐)
基于属性的加密
访问控制
密文
公钥密码术
密码学
物联网
相互认证
作者
Fei Xia,Jiaming Mao,Shao Zhipeng,Liangjie Xu,Ran Zhao,Yang Yunzhi
标识
DOI:10.1007/978-3-030-78612-0_44
摘要
To solve low computing efficiency and high computational energy consumption in the traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an authentication scheme for IoT devices based on the Identity-based Encryption is proposed in this paper, which is realized by introducing traceable and revocable mechanisms. The effective management of the secret key of the suspicious devices by the authentication center and the reasonable accountability of the dishonest private key generator (PKG) are realized. Finally, through the security proof, it is verified that the Identity-based Encryption designed in this paper can meet the security of the Chosen Ciphertext Attack (CCA), indicating that the scheme has high practicability and security.
科研通智能强力驱动
Strongly Powered by AbleSci AI