OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT

被引:0
|
作者
Zhang, Yudi [1 ,2 ]
Li, Yumei [1 ]
Zheng, Mingwu [2 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024 | 2025年 / 15053卷
基金
湖北省教育厅重点项目; 中国国家自然科学基金;
关键词
VBP Obfuscation; Identity-based Signature; Security; Privacy; NB-IoT;
D O I
10.1007/978-981-97-9053-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become pervasive in various domains and offers unprecedented convenience to society. The Narrowband Internet of Things (NB-IoT) technology is particularly well-suited for deployment in applications such as smart manufacturing, smart homes, and smart cities. However, NB-IoT requires low power consumption and network security, which pose significant challenges. While several cryptographic schemes have been proposed for NB-IoT, most of them are infeasible due to the high computing power required by the nodes. In this paper, we propose a secure obfuscation for encrypted identity-based signatures in NB-IoT. Our approach leverages the high computational power of the IoT gateway to generate an encrypted signature, while ensuring the node's private key cannot be extracted. We prove that our scheme satisfies the virtual black box (VBB) properties and is secure against attacks by semi-honest gateways. Furthermore, we implement our scheme using the Java pairing-based cryptography library (JPBC) on a laptop and a server, and our experimental results demonstrate the practicality of our scheme in IoT applications.
引用
收藏
页码:383 / 402
页数:20
相关论文
共 50 条
  • [1] Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks
    Zhang, Yudi
    He, Debiao
    Li, Yumei
    Zhang, Mingwu
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5320 - 5328
  • [2] Secure Obfuscation for Encrypted Group Signatures
    Shi, Yang
    Zhao, Qinpei
    Fan, Hongfei
    Liu, Qin
    PLOS ONE, 2015, 10 (07):
  • [3] Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
    Wahaballa, Abubaker
    ELECTRONICS, 2022, 11 (21)
  • [4] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [5] A Tightly Secure Identity-Based Signature Scheme from Isogenies
    Chen, Jiawei
    Jo, Hyungrok
    Sato, Shingo
    Shikata, Junji
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 141 - 163
  • [6] A Non-orthogonal Random Access Scheme Based on NB-IoT
    Wang, Dan
    Qu, Yuanyuan
    Fu, Yongli
    Yang, Yanjuan
    Chen, Qirong
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (04) : 2625 - 2639
  • [7] A Non-orthogonal Random Access Scheme Based on NB-IoT
    Dan Wang
    Yuanyuan Qu
    Yongli Fu
    Yanjuan Yang
    Qirong Chen
    Wireless Personal Communications, 2020, 111 : 2625 - 2639
  • [8] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [9] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
    Krzywiecki, Lukasz
    Slowik, Marta
    Szala, Michal
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
  • [10] Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
    Boldyreva, Alexandra
    Gentry, Craig
    O'Neill, Adam
    Yum, Dae Hyun
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 276 - +