Secure aggregate signature scheme for smart city applications

Computer Communications - Tập 193 - Trang 388-395 - 2022
Nabeil Eltayieb1, Rashad Elhabob1, Muhammad Umar Aftab2, Ramil Kuleev3, Manuel Mazzara4, Muhammad Ahmad2
1College of Computer Science and Information Technology, Karary University, Sudan
2Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, Chiniot 35400, Pakistan
3Institute of Artificial Intelligence, Innopolis University, Innopolis, 420500, Russia
4Institute of Software Development and Engineering, Innopolis University, Innopolis, 420500, Russia

Tài liệu tham khảo

Eltayieb, 2021, Secure mobile health system supporting search function and decryption verification, J. Ambient Intell. Humaniz. Comput., 12, 2221, 10.1007/s12652-020-02321-3 Nations, 2014, World urbanization prospects: The 2014 revision, highlights. department of economic and social affairs Adeli, 2008 Elhabob, 2021, An efficient signcryption scheme for vehicular satellite-based networks, J. Karary Univ. Eng. Sci., 10.54388/jkues.v1i2.110 Ahmad, 2016, Gait fingerprinting-based user identification on smartphones, 3060 Hu, 2016, Smart home in a box: usability study for a large scale self-installation of smart home technologies, J. Reliab. Intell. Environ., 2, 93, 10.1007/s40860-016-0021-y Ahmad, 2018, Smartwatch-based legitimate user identification for cloud-based secure services, Mob. Inf. Syst., 2018 Elhabob, 2020, Identity-based encryption with authorized equivalence test for cloud-assisted IoT, Cluster Comput., 23, 1085, 10.1007/s10586-019-02979-1 Chen, 2009, Survey on smart grid technology, Power Syst. Technol., 8, 1 Elkhalil, 2021, An efficient signcryption of heterogeneous systems for internet of vehicles, J. Syst. Archit., 113, 10.1016/j.sysarc.2020.101885 Eltayieb, 2020, A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud, J. Syst. Archit., 102, 10.1016/j.sysarc.2019.101653 Corno, 2015, Designing for user confidence in intelligent environments, J. Reliab. Intell. Environ., 1, 11, 10.1007/s40860-015-0001-7 Elhabob, 2019, Efficient certificateless public key cryptography with equality test for internet of vehicles, IEEE Access, 7, 68957, 10.1109/ACCESS.2019.2917326 Ahmad, 2021, Multi sensor-based implicit user identification, CMC-Comput. Mater. Continua, 68, 1673, 10.32604/cmc.2021.016232 Zetter, 2016, Inside the cunning, unprecedented hack of Ukraine’s power grid, Wired Elhabob, 2018 Elhabob, 2020, An efficient certificateless public key cryptography with authorized equality test in IIoT, J. Ambient Intell. Humaniz. Comput., 11, 1065, 10.1007/s12652-019-01365-4 Boneh, 2003, Aggregate and verifiably encrypted signatures from bilinear maps, 416 Gong, 2007, Two certificateless aggregate signatures from bilinear maps, 188 Liu, 2014, New construction of efficient certificateless aggregate signatures, Int. J. Secur. Appl., 8, 411 Chen, 2015, Certificateless aggregate signature with efficient verification, Secur. Commun. Netw., 8, 2232, 10.1002/sec.1166 Xie, 2019, iCLAS: An improved certificateless aggregate signature scheme for healthcare wireless sensor networks, IEEE Access, 7, 15170, 10.1109/ACCESS.2019.2894895 Cheng, 2015, Cryptanalysis and improvement of a certificateless aggregate signature scheme, Inform. Sci., 295, 337, 10.1016/j.ins.2014.09.065 Zhang, 2014, Notes on the security of certificateless aggregate signature schemes, Inform. Sci., 287, 32, 10.1016/j.ins.2014.07.019 Zhang, 2015, Comment on new construction of efficient certificateless aggregate signatures, Int. J. Secur. Appl., 9, 147 Zhang, 2009, A new certificateless aggregate signature scheme, Comput. Commun., 32, 1079, 10.1016/j.comcom.2008.12.042 Zhang, 2010, Efficient many-to-one authentication with certificateless aggregate signatures, Comput. Netw., 54, 2482, 10.1016/j.comnet.2010.04.008 Sharma, 2017, A secure remote user authentication scheme for smart cities e-governance applications, J. Reliab. Intell. Environ., 3, 177, 10.1007/s40860-017-0046-x Xiong, 2013, An efficient certificateless aggregate signature with constant pairing computations, Inform. Sci., 219, 225, 10.1016/j.ins.2012.07.004 He, 2014, Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Inform. Sci., 268, 458, 10.1016/j.ins.2013.09.032 Liu, 2016, Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network, J. Commun., 37, 182 Kumar, 2018, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustain. Comput. Inf. Syst., 18, 80 Wu, 2018, New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment, Secur. Commun. Netw., 2018, 10.1155/2018/2595273