A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

Journal of Information Security and Applications - Tập 58 - Trang 102625 - 2021
Saddam Hussain1, Insaf Ullah2, Hizbullah Khattak1, Muhammad Asghar Khan2, Chien-Ming Chen3, Saru Kumari4
1IT Department, Hazara University, Mansehra, 21120, KP, Pakistan
2HIET, Hamdard University, Islamabad Campus, Islamabad 44000, Pakistan
3College of Computer Science and Engineering, Shandong University of Science and Technology, Shandong, 266590, China
4Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India

Tài liệu tham khảo

ur Rehman, 2019, The role of big data analytics in industrial Internet of Things, Future Gener Comput Syst, 99, 247, 10.1016/j.future.2019.04.020 Aazam, 2018, Deploying fog computing in industrial internet of things and industry 4.0, IEEE Trans Ind Inform, 14, 4674, 10.1109/TII.2018.2855198 Oztemel, 2020, Literature review of Industry 4.0 and related technologies, J Intell Manuf, 31, 127, 10.1007/s10845-018-1433-8 Xu, 2019, Big data for cyber physical systems in industry 4.0: a survey, Enterp Inform Syst, 13, 148, 10.1080/17517575.2018.1442934 Yang, 2019, Faster authenticated key agreement with perfect forward secrecy for Industrial Internet-of-Things, IEEE Trans Ind Inform Boyes, 2018, The industrial internet of things (IIoT): an analysis framework, Comput Ind, 101, 1, 10.1016/j.compind.2018.04.015 Sisinni, 2018, Industrial internet of things: challenges, opportunities, and directions, IEEE Trans Ind Inform, 14, 4724, 10.1109/TII.2018.2852491 Wollschlaeger, 2017, The future of industrial communication: automation networks in the era of the internet of things and industry 4.0, IEEE Ind Electron Mag, 11, 17, 10.1109/MIE.2017.2649104 Radanliev, P., De Roure, D., Nurse, J.R., Nicolescu, R., Huth, M., Cannady, S. and Montalvo, R.M., New developments in Cyber Physical Systems, the Internet of Things and the Digital Economy-discussion on future developments in the Industrial Internet of Things and Industry 4.0. 2019 Preprints, (www.preprints.org) | NOT PEER-REVIEWED | Posted: 7 March 2019 doi:10.20944/preprints201903.0094.v1. Sisinni, 2018, Industrial Internet of Things: challenges, opportunities, and directions, IEEE Trans Ind Inform, 14, 4724, 10.1109/TII.2018.2852491 Verma, 2020, An Efficient and provable certificate-based proxy signature scheme for IIoT environment, Inf Sci, 10.1016/j.ins.2020.01.006 Ullah, 2019, A lightweight and provable secured certificateless signcryption approach for crowdsourced iiot applications, Symmetry, 11, 1386, 10.3390/sym11111386 Wu, 2019, Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments, IEEE Access, 7, 49232, 10.1109/ACCESS.2019.2909040 Kumari, 2017, Design of a provably secure biometrics-based multi-cloud-server authentication scheme, Future Gener Comput Syst, 68, 320, 10.1016/j.future.2016.10.004 Hussain, 2020, A lightweight and formally secure certificate based signcryption with proxy Re-Encryption (CBSRE) for Internet of Things Enabled smart grid, IEEE Access, 8, 93230, 10.1109/ACCESS.2020.2994988 Yu, 2019, A survey on IIoT security, 1 Kumar, 2018, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustain Comput, 18, 80 Kumar, 2019, Secure CLS and CL-AS schemes designed for VANETs, J Supercomput, 75, 3076, 10.1007/s11227-018-2312-y Zheng, 1997, Digital signcryption or how to achieve cost (signature & encryption)? cost (signature)+ cost (encryption), 165 Han, 2006, ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intell Comput, 956, 10.1007/11833529_97 Hundera, 2020, A secure and efficient identity-based proxy signcryption in cloud data sharing, KSII Trans Internet Inform Syst, 14 Mambo, 1996, Proxy signatures: delegation of the power to sign messages, IEICE Trans Fundam Electron Commun Comput Sci, 79, 1338 Gamage, 1999, An efficient scheme for secure message transmission using proxysigncryption, 420 Shamir, 1984, Identity-based cryptosystems and signature schemes, 196, 47 Suárez-Albela, 2018, A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices, Sensors, 18, 3868, 10.3390/s18113868 Yu1, 2018, Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain, Int J Distrib Sens Netw, 14, 1 Braeken, 2018, PUF Based Authentication Protocol for IoT, Symmetry, 10, 352, 10.3390/sym10080352 Zhou, 2017, Certificateless key-insulated generalized signcryption scheme without bilinear pairings, Secur Commun Netw, 10.1155/2017/8405879 Kumari, 2017, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, J Supercomput, 74, 6428, 10.1007/s11227-017-2048-0 Omala, 2018, Provably secure heterogeneous access control scheme for wireless body area network, J Med Syst, 42 Tamizhselvan, 2019, An energy efficient secure distributed naming service for IoT, Int J Adv Stud Sci Res, 3 Naresh, 2018, Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks, Int J Commun Syst, 31, e3763, 10.1002/dac.3763 Rahman, 2018, A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve, Int J Adv Comput Sci Appl, 9 Li, 2004, Identity based proxy-signcryption scheme from pairings, 494 Wang, 2005, Efficient ID-based proxy signature and proxy signcryption form bilinear pairings, 167 Wang, 2005, Efficient identity based proxy-signcryption schemes with forward security and public verifiability, 982 Elkamchouchi, 2008, A new proxy identity-based signcryption scheme for partial delegation of signing rights, IACR Cryptol ePrint Arch, 41 Tian, 2009, Secure ID-based proxy signcryption scheme with designated proxy signcrypter, 1, 351 Tsai, 2007, Security enhancement of a novel proxy key generation protocol, 2, 681 Swapna, 2012, An efficient ID-based proxy signcryption scheme, Int J Inform Netw Secur (IJINS), 1, 200 Elkamchouchi, 2013, An efficient ID-based proxy signcryption scheme without bilinear pairings, Int J Comput Appl jian, 2013, Identity based proxy signcryption schemes, Appl Mech Mater, 380-384, 2605, 10.4028/www.scientific.net/AMM.380-384.2605 Lo, 2014, A provably secure proxy signcryption scheme using bilinear pairings, J Appl Math, 10.1155/2014/454393 Lin, 2010, Efficient proxy signcryption scheme with provable CCA and CMA security, Comput Math Appl, 60, 1850, 10.1016/j.camwa.2010.07.015 Zhou, 2018, A provable secure identity-based generalized proxy signcryption scheme, Int J Netw Secur, 20, 1183 Huifang Y., Zhicang W., Jianmin L., and Xinzhe G.. Identity-Based Proxy Signcryption Protocol with Universal Composability. Security and Communication Networks 2018 ; Volume 2018 |Article ID 9531784 | https://doi.org/10.1155/2018/9531784. Guo, 2020, An identity based proxy signcryption scheme without pairings, Int J Netw Secur Wollinger, 2005, ‘Cantor versus harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems, IEEE Trans Comput, 54, 861, 10.1109/TC.2005.109 Wollinger, 2004, Elliptic and hyperelliptic curves on embedded, ACM Trans Embedded Comput Syst, 3, 509, 10.1145/1015047.1015051 Fan, 2007, ‘Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields, IET Inf Secur, 1, 65, 10.1049/iet-ifs:20070003 Pelzl, 2003, ‘Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves, 351 Khan, 2020, An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying Ad-hoc network, IEEE Access, 8, 36807, 10.1109/ACCESS.2020.2974381 Khan, 2020, An efficient and provably secure certificateless blind signature scheme for flying Ad-Hoc network based on multi-access edge computing, Electronics, 9, 30, 10.3390/electronics9010030 Ullah, 2019, An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the Internet of Things, Electronics, 8, 1171, 10.3390/electronics8101171 Ullah, 2019, A Novel Provable Secured Signcryption Scheme????: A Hyper-Elliptic Curve-Based Approach, Mathematics. Mathematics, MDPI, 7, 686 Ullah, 2020, A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with Internet of Things, IEEE Access