Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT

With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their o...

Full description

Saved in:
Bibliographic Details
Published in2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) pp. 556 - 564
Main Authors Li, Hongjun, Kong, Fanyu, Yu, Jia, Zhang, Hanlin, Diao, Luhong, Tao, Yunting
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their own identity as the public key to carry out data encryption and digital signature, which is very suitable for applying in the IoT environment with a large number of terminal devices. However, these protocols usually involve some complex cryptographic operations, which hinder their application on the resource-constrained IoT devices. In this paper, we design a privacy-preserving and verifiable outsourcing message transmission and authentication protocol, which allows the resource-constrained users to delegate some complex operations to the two untrusted edge servers and reduce the computational burden on the users side. The designed protocol contains several secure and novel outsourcing algorithms for modular exponentiation, bilinear pairing and scalar multiplication. For the different operations in the different situations, we design several different blinding techniques and verification methods, which not only protect the users' private information, but also ensure the users can verify the correctness of results. Finally, we carry out some experiments to show that our proposed protocol is efficient.
ISSN:2324-9013
DOI:10.1109/TrustCom56396.2022.00082