Research Article
Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval
Input:(i) ⊳ The content key for each | (ii) ⊳ The data public key managed by Shamir secret sharing | (iii) ⊳ The data access structure, which will be | implicitly included in the ciphertext | Choose ⊳ The random secrets of each data slice | (2) Choose ⊳ A random encryption exponent | (3) Choose ⊳ A random vector, where | are used to share the random encryption exponent | (4) for to do | (5) Compute ⊳ is the vector corresponding to the j-th row of | the matrix | (6) end for | (7) Randomly choose | (8) Compute: and | (9) for to do | (10) Compute | (11) Compute and | (12) end for | (13) Compute the ciphertext: | | Output:The ciphertext |
|