Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 9, Pages 7229-7240Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3038928
Keywords
Internet of Things; Cryptography; Quantum mechanics; Quantum computing; Privacy; Computer architecture; Protocols; Internet-of-Things (IoT) query; privacy preserving; private information retrieval
Categories
Funding
- NSFC [61802023, 61701553, 61672110, 61702469, 61771439]
- Industrial Internet Innovation and Development Project [TC190H3WR]
- Joint Founds of the NSFC and Xinjiang [U1603261]
- National Cryptography Development Fund [MMJJ20170120]
- Sichuan Youth Science and Technology Foundation [2017JQ0045]
- Fundamental Research Funds for the Central Universities [2019XD-A01]
Ask authors/readers for more resources
The development of the Internet of Things has brought various convenient IoT services, but privacy leakage is a serious issue. The privacy-preserving problem of IoT query has attracted much attention, especially on how to design secure schemes under the threat of quantum computation.
The development of the Internet of Things (IoT) has brought various IoT services, which facilitate and enrich human life. All these services are at risk of privacy leakage. The privacy-preserving issue of IoT query, which is a typical service, has attracted much attention. A superior candidate for solving the above issue is classical cryptographic schemes based on the computational difficulty. With the advent of quantum computation, the security of such schemes may be broken by the strong ability of some advanced quantum algorithms. How to design a secure scheme for privacy-preserving query under the threat of quantum computation is crucial. To this end, we construct a general architecture of privacy-preserving query in IoT scenarios. Besides trust or honesty-but-curious models, we present a scheme for privacy-preserving query which is also valid in the scenario of untrusted devices. We provide a detailed security analysis. The result shows our scheme achieves private preservation of both service providers and clients.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available