A security communication model based on certificateless online/offline signcryption for Internet of Things

被引:21
作者
Luo, Ming [1 ]
Tu, Min [1 ]
Xu, Jianfeng [1 ]
机构
[1] Nanchang Univ, Sch Software, Nanchang 330047, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; communication model; certificateless; online/offline signcryption; public verifiability; PROTOCOL;
D O I
10.1002/sec.836
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The communication model of Internet of Things (IOT) application has some shortcomings in user privacy protection and information security. To solve these shortcomings, we define the formal models of certificateless online/offline signcryption and propose a concrete certificateless online/offline signcryption scheme for IOT environment. Compared with the existing identity-based online/offline signcryption schemes that do not require the plaintext and the receiver's identity in the offline phase, our scheme has the great advantage of the offline computation cost, offline storage, ciphertext length, and receiver computation cost. Moreover, our scheme achieves known session-specific temporary information security, public verifiability with confidentiality and no key escrow problem. Copyright (C) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1560 / 1569
页数:10
相关论文
共 18 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Interoperability of Security-Enabled Internet of Things
    Alam, Sarfraz
    Chowdhury, Mohammad M. R.
    Noll, Josef
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 567 - 586
  • [3] An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
  • [4] A pairing-free certificateless authenticated key agreement protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (02) : 221 - 230
  • [5] Hui Suo, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P648, DOI 10.1109/ICCSEE.2012.373
  • [6] Jie Liu, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P288, DOI 10.1109/ICCSEE.2012.45
  • [7] Lee J, 2012, ADV INTEL SOFT COMPU, V149, P241
  • [8] Identity-based online/offline signcryption for low power devices
    Li, Fagen
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Takagi, Tsuyoshi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 340 - 347
  • [9] Li H, 2011, COMM COM INF SC, V224, P404
  • [10] Liu JK, 2011, LECT NOTES COMPUT SC, V6584, P36, DOI 10.1007/978-3-642-21518-6_3