4.8 Article

ESPQuery: An Enhanced Secure Scheme for Privacy-Preserving Query Based on Untrusted Devices in the Internet of Things

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 9, Pages 7229-7240

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3038928

Keywords

Internet of Things; Cryptography; Quantum mechanics; Quantum computing; Privacy; Computer architecture; Protocols; Internet-of-Things (IoT) query; privacy preserving; private information retrieval

Funding

  1. NSFC [61802023, 61701553, 61672110, 61702469, 61771439]
  2. Industrial Internet Innovation and Development Project [TC190H3WR]
  3. Joint Founds of the NSFC and Xinjiang [U1603261]
  4. National Cryptography Development Fund [MMJJ20170120]
  5. Sichuan Youth Science and Technology Foundation [2017JQ0045]
  6. Fundamental Research Funds for the Central Universities [2019XD-A01]

Ask authors/readers for more resources

The development of the Internet of Things has brought various convenient IoT services, but privacy leakage is a serious issue. The privacy-preserving problem of IoT query has attracted much attention, especially on how to design secure schemes under the threat of quantum computation.
The development of the Internet of Things (IoT) has brought various IoT services, which facilitate and enrich human life. All these services are at risk of privacy leakage. The privacy-preserving issue of IoT query, which is a typical service, has attracted much attention. A superior candidate for solving the above issue is classical cryptographic schemes based on the computational difficulty. With the advent of quantum computation, the security of such schemes may be broken by the strong ability of some advanced quantum algorithms. How to design a secure scheme for privacy-preserving query under the threat of quantum computation is crucial. To this end, we construct a general architecture of privacy-preserving query in IoT scenarios. Besides trust or honesty-but-curious models, we present a scheme for privacy-preserving query which is also valid in the scenario of untrusted devices. We provide a detailed security analysis. The result shows our scheme achieves private preservation of both service providers and clients.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available