Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in Iot with Edge Computing

Hongjun Li,Fanyu Kong,Jia Yu,Hanlin Zhang,Yunting Tao
DOI: https://doi.org/10.2139/ssrn.4080721
2022-01-01
SSRN Electronic Journal
Abstract:With the popularity of IoT and 5G, the privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key, which allow the users to utilize their own identity as the public key to carry out data encryption and data signature, which is very suitable for applying in the IoT environment with a large number of terminal devices. However, these protocols usually involve some complex cryptographic operations, which hinder their application on the resource-constrained IoT devices. Secure outsourcing computation, as an important application of edge computing, can allow the resource-constrained devices to delegate the complex computations to the nearby edge servers. In this paper, we design a privacy-preserving and verifiable outsourcing message transmission and authentication protocol, which allows the resource-constrained users to delegate some complex operations to the two untrusted edge servers and reduce the computational burden on the users side. It is great meaningful for the promotion and application of the identity-based protocols. The designed protocol contains several secure and novel outsourcing algorithms for modular exponentiation, bilinear pairing and scalar multiplication. For the different operations in the different situations, we design several different blinding techniques and verification methods, which not only protect the users’ private information from being disclosed to the edge servers, but also ensure the users can verify the correctness of the results returned from the edge servers with a higher probability and the lower computational complexity. Finally, we carry out some experiments to show that our proposed protocol is efficient.
What problem does this paper attempt to address?