OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT

被引:0
|
作者
Zhang, Yudi [1 ,2 ]
Li, Yumei [1 ]
Zheng, Mingwu [2 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024 | 2025年 / 15053卷
基金
湖北省教育厅重点项目; 中国国家自然科学基金;
关键词
VBP Obfuscation; Identity-based Signature; Security; Privacy; NB-IoT;
D O I
10.1007/978-981-97-9053-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become pervasive in various domains and offers unprecedented convenience to society. The Narrowband Internet of Things (NB-IoT) technology is particularly well-suited for deployment in applications such as smart manufacturing, smart homes, and smart cities. However, NB-IoT requires low power consumption and network security, which pose significant challenges. While several cryptographic schemes have been proposed for NB-IoT, most of them are infeasible due to the high computing power required by the nodes. In this paper, we propose a secure obfuscation for encrypted identity-based signatures in NB-IoT. Our approach leverages the high computational power of the IoT gateway to generate an encrypted signature, while ensuring the node's private key cannot be extracted. We prove that our scheme satisfies the virtual black box (VBB) properties and is secure against attacks by semi-honest gateways. Furthermore, we implement our scheme using the Java pairing-based cryptography library (JPBC) on a laptop and a server, and our experimental results demonstrate the practicality of our scheme in IoT applications.
引用
收藏
页码:383 / 402
页数:20
相关论文
共 50 条
  • [31] Tighter Reductions for Deterministic Identity-Based Signatures
    Yanai, Naoto
    Fujiwara, Toru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01): : 64 - 76
  • [32] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37): : 1025 - 1029
  • [33] A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems
    Chen, Xin
    He, Debiao
    Peng, Cong
    Luo, Min
    Huang, Xinyi
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2024, 60 (04) : 5157 - 5168
  • [34] An identity-based traceable ring signatures based on lattice
    Junbin Liang
    Qiong Huang
    Jianye Huang
    Liantao Lan
    Man Ho Allen Au
    Peer-to-Peer Networking and Applications, 2023, 16 : 1270 - 1285
  • [35] A provably secure identity-based access control scheme for renewable energy Internet of Things
    Zhang, Jiyu
    Wu, Kehe
    Tian, Zheng
    Sun, Yizhen
    Wu, Yuxi
    Guo, Yaodong
    ENERGY, 2024, 313
  • [36] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240
  • [37] AN IDENTITY-BASED PERSONAL LOCATION SYSTEM WITH PROTECTED PRIVACY IN IOT
    Hu, Chunye
    Zhang, Jie
    Wen, Qiaoyan
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 192 - 195
  • [38] An identity-based secure VANET communication system
    Naresh, Vankamamidi S.
    Reddi, Sivaranjani
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [39] Performance Testbed in IoT Network based on ZigBee and NB-IoT Technologies
    Inthasuth, Tanakorn
    Choterungrote, Watthanakorn
    Bandasak, Chatdanai
    Banboon, Thanawut
    Ngoc Thien Le
    2024 INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS, AND COMMUNICATIONS, ITC-CSCC 2024, 2024,
  • [40] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310