A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
Tài liệu tham khảo
ur Rehman, 2019, The role of big data analytics in industrial Internet of Things, Future Gener Comput Syst, 99, 247, 10.1016/j.future.2019.04.020
Aazam, 2018, Deploying fog computing in industrial internet of things and industry 4.0, IEEE Trans Ind Inform, 14, 4674, 10.1109/TII.2018.2855198
Oztemel, 2020, Literature review of Industry 4.0 and related technologies, J Intell Manuf, 31, 127, 10.1007/s10845-018-1433-8
Xu, 2019, Big data for cyber physical systems in industry 4.0: a survey, Enterp Inform Syst, 13, 148, 10.1080/17517575.2018.1442934
Yang, 2019, Faster authenticated key agreement with perfect forward secrecy for Industrial Internet-of-Things, IEEE Trans Ind Inform
Boyes, 2018, The industrial internet of things (IIoT): an analysis framework, Comput Ind, 101, 1, 10.1016/j.compind.2018.04.015
Sisinni, 2018, Industrial internet of things: challenges, opportunities, and directions, IEEE Trans Ind Inform, 14, 4724, 10.1109/TII.2018.2852491
Wollschlaeger, 2017, The future of industrial communication: automation networks in the era of the internet of things and industry 4.0, IEEE Ind Electron Mag, 11, 17, 10.1109/MIE.2017.2649104
Radanliev, P., De Roure, D., Nurse, J.R., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R.M., New developments in Cyber Physical Systems, the Internet of Things and the Digital Economy-discussion on future developments in the Industrial Internet of Things and Industry 4.0. 2019
Preprints, (www.preprints.org) | NOT PEER-REVIEWED | Posted: 7 March 2019 doi:10.20944/preprints201903.0094.v1.
Sisinni, 2018, Industrial Internet of Things: challenges, opportunities, and directions, IEEE Trans Ind Inform, 14, 4724, 10.1109/TII.2018.2852491
Verma, 2020, An Efficient and provable certificate-based proxy signature scheme for IIoT environment, Inf Sci, 10.1016/j.ins.2020.01.006
Ullah, 2019, A lightweight and provable secured certificateless signcryption approach for crowdsourced iiot applications, Symmetry, 11, 1386, 10.3390/sym11111386
Wu, 2019, Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments, IEEE Access, 7, 49232, 10.1109/ACCESS.2019.2909040
Kumari, 2017, Design of a provably secure biometrics-based multi-cloud-server authentication scheme, Future Gener Comput Syst, 68, 320, 10.1016/j.future.2016.10.004
Hussain, 2020, A lightweight and formally secure certificate based signcryption with proxy Re-Encryption (CBSRE) for Internet of Things Enabled smart grid, IEEE Access, 8, 93230, 10.1109/ACCESS.2020.2994988
Yu, 2019, A survey on IIoT security, 1
Kumar, 2018, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustain Comput, 18, 80
Kumar, 2019, Secure CLS and CL-AS schemes designed for VANETs, J Supercomput, 75, 3076, 10.1007/s11227-018-2312-y
Zheng, 1997, Digital signcryption or how to achieve cost (signature & encryption)? cost (signature)+ cost (encryption), 165
Han, 2006, ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intell Comput, 956, 10.1007/11833529_97
Hundera, 2020, A secure and efficient identity-based proxy signcryption in cloud data sharing, KSII Trans Internet Inform Syst, 14
Mambo, 1996, Proxy signatures: delegation of the power to sign messages, IEICE Trans Fundam Electron Commun Comput Sci, 79, 1338
Gamage, 1999, An efficient scheme for secure message transmission using proxysigncryption, 420
Shamir, 1984, Identity-based cryptosystems and signature schemes, 196, 47
Suárez-Albela, 2018, A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices, Sensors, 18, 3868, 10.3390/s18113868
Yu1, 2018, Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain, Int J Distrib Sens Netw, 14, 1
Braeken, 2018, PUF Based Authentication Protocol for IoT, Symmetry, 10, 352, 10.3390/sym10080352
Zhou, 2017, Certificateless key-insulated generalized signcryption scheme without bilinear pairings, Secur Commun Netw, 10.1155/2017/8405879
Kumari, 2017, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, J Supercomput, 74, 6428, 10.1007/s11227-017-2048-0
Omala, 2018, Provably secure heterogeneous access control scheme for wireless body area network, J Med Syst, 42
Tamizhselvan, 2019, An energy efficient secure distributed naming service for IoT, Int J Adv Stud Sci Res, 3
Naresh, 2018, Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks, Int J Commun Syst, 31, e3763, 10.1002/dac.3763
Rahman, 2018, A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve, Int J Adv Comput Sci Appl, 9
Li, 2004, Identity based proxy-signcryption scheme from pairings, 494
Wang, 2005, Efficient ID-based proxy signature and proxy signcryption form bilinear pairings, 167
Wang, 2005, Efficient identity based proxy-signcryption schemes with forward security and public verifiability, 982
Elkamchouchi, 2008, A new proxy identity-based signcryption scheme for partial delegation of signing rights, IACR Cryptol ePrint Arch, 41
Tian, 2009, Secure ID-based proxy signcryption scheme with designated proxy signcrypter, 1, 351
Tsai, 2007, Security enhancement of a novel proxy key generation protocol, 2, 681
Swapna, 2012, An efficient ID-based proxy signcryption scheme, Int J Inform Netw Secur (IJINS), 1, 200
Elkamchouchi, 2013, An efficient ID-based proxy signcryption scheme without bilinear pairings, Int J Comput Appl
jian, 2013, Identity based proxy signcryption schemes, Appl Mech Mater, 380-384, 2605, 10.4028/www.scientific.net/AMM.380-384.2605
Lo, 2014, A provably secure proxy signcryption scheme using bilinear pairings, J Appl Math, 10.1155/2014/454393
Lin, 2010, Efficient proxy signcryption scheme with provable CCA and CMA security, Comput Math Appl, 60, 1850, 10.1016/j.camwa.2010.07.015
Zhou, 2018, A provable secure identity-based generalized proxy signcryption scheme, Int J Netw Secur, 20, 1183
Huifang Y., Zhicang W., Jianmin L., and Xinzhe G.. Identity-Based Proxy Signcryption Protocol with Universal Composability. Security and Communication Networks 2018 ; Volume 2018 |Article ID 9531784 | https://doi.org/10.1155/2018/9531784.
Guo, 2020, An identity based proxy signcryption scheme without pairings, Int J Netw Secur
Wollinger, 2005, ‘Cantor versus harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems, IEEE Trans Comput, 54, 861, 10.1109/TC.2005.109
Wollinger, 2004, Elliptic and hyperelliptic curves on embedded, ACM Trans Embedded Comput Syst, 3, 509, 10.1145/1015047.1015051
Fan, 2007, ‘Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields, IET Inf Secur, 1, 65, 10.1049/iet-ifs:20070003
Pelzl, 2003, ‘Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves, 351
Khan, 2020, An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying Ad-hoc network, IEEE Access, 8, 36807, 10.1109/ACCESS.2020.2974381
Khan, 2020, An efficient and provably secure certificateless blind signature scheme for flying Ad-Hoc network based on multi-access edge computing, Electronics, 9, 30, 10.3390/electronics9010030
Ullah, 2019, An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the Internet of Things, Electronics, 8, 1171, 10.3390/electronics8101171
Ullah, 2019, A Novel Provable Secured Signcryption Scheme????: A Hyper-Elliptic Curve-Based Approach, Mathematics. Mathematics, MDPI, 7, 686
Ullah, 2020, A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with Internet of Things, IEEE Access