Font Size: a A A

Research On Leakage-Resistance Identity-Based Encryption Technology In Internet Of Things

Posted on:2020-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:P Z LangFull Text:PDF
GTID:2428330590478379Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The speed of development of the Internet of Things is beyond the imagination of most of us.We are using the technology of the Internet of Things anytime and anywhere.The intelligent medical system plays an important role in daily life and provides a reliable guarantee for our physical and mental health.With the increasing scale of medical system,more and more medical records are centralized and stored in cloud.However,medical records stored in cloud carry a large amount of personal information,and are vulnerable to attacks when they are exchanged over the Internet,such as data loss,hacker hijacking,etc.In recent years,a large number of medical information leakage stored in the cloud has attracted more and more people's attention.The security of medical data is considered to be the most important challenge in the deployment of medical systems.Therefore,how to enjoy the convenience of the Internet of Things and at the same time to protect the privacy of users has become the focus of researchers.At present,the method to solve the above problems is generally to apply various encryption schemes in the application of Internet of Things.In recent years,a large number of identity-based encryption schemes have been proposed.At the same time,identity-based encryption schemes have been applied in various fields of the Internet of Things.However,most of the work in the analysis of cryptographic schemes is concentrated on abstract adversarial models that do not capture side-channel attacks.Such attacks exploit various forms of unintended information leakage,which is inherent to almost all physical implementations.In order to resist side channel attacks,especially "cold start attacks",researchers formalized a lot of realistic framework for modeling the security of encryption schemes against a wide class of side-channel attacks in which adversarially chosen functions of the secret key are leaked.Leakage-resilient encryption technology has received more and more attention.In this thesis,two effective and secure leakage-resilient identity-based encryption schemes are proposed,and the second scheme is applied in the intelligent medical system.The first scheme is called leakage-resilient identity-based encryption,which is based on asymmetric decision bilinear Diffie-Hellman assumption in bounded leakage model and random oracle model.The security analysis proves that our scheme is against selective ciphertext attack.The simulation results show that our scheme has some advantages in efficiency with other schemes.Our second scheme is to propose an identity-based hierarchical algorithm with leakage-resilient function in the bounded leak model,and apply the scheme to the intelligent medical system.Our system is based on bilinear Diffie-Hellman exponent assumption and Decisional linear assumption.And the length of public key,private key and ciphertext will not increase with the identity depth.In our scheme,even if the private key is partially leaked,malicious users cannot get otherpeople's electronic health records.Finally,an example is given to illustrate the feasibility of the system,and the security analysis and simulation analysis of the scheme show that the scheme in this thesis is safe and efficient.
Keywords/Search Tags:hierarchical identity-based encryption, leakage-resilient, data security, side-channel attacks
PDF Full Text Request
Related items