
Support Outsourcing Unsigncryption and Member Revocation Identity-based Proxy Signcryption Scheme with Drone Environment
Author(s) -
Xiaodong Yang,
Wanting Xi,
Ningning Ren,
Jiaqi Wang,
Meijuan Li
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1828/1/012119
Subject(s) - signcryption , revocation , computer science , computer security , cloud computing , encryption , public key cryptography , outsourcing , password , key generation , computer network , proxy (statistics) , delegation , server , overhead (engineering) , operating system , business , marketing , machine learning , political science , law
The identity-based signcryption scheme combines the advantages of the signcryption scheme and the identity-based cryption scheme, which has high calculation and communication efficiency and easy key management. In order to effectively solve the problems of high latency and data information privacy during the secure transmission of drone data to cloud servers, we propose an identity-based proxy signcryption scheme that supports outsourcing decryption and member revocation. The complex bilinear pairing calculation is outsourced to the cloud server to reduce the user’s computing overhead. When an illegal user wants to access the data, the illegal user’s identity value ID will be put into the revocation list and the update private key algorithm is executed to generate an update password for the unrevoked user Key, revoked users lose the ability to decrypt because they cannot obtain the updated key that matches them. The identity-based signcryption scheme protected by the proxy can satisfy unforgeability and forward security. Finally, the comparison results show that this solution is superior to previous work in terms of function and calculation time.