Pairing free identity based aggregate signcryption scheme

被引:16
作者
Abouelkheir, Eman [1 ,2 ]
El-sherbiny, Shamia [1 ]
机构
[1] Kafrelsheikh Univ, Coll Engn, Dept Elect Engn, Kafrelsheikh 33516, Egypt
[2] Qassim Univ, Coll Arts & Sci, Dept Comp Sci, AlRass 51452, Saudi Arabia
关键词
computational complexity; digital signatures; telecommunication security; vehicular ad hoc networks; wireless sensor networks; public key cryptography; ad hoc networks; cryptography; cryptographic protocols; aggregate signcryption scheme ID-ASC; secure provably identity; ad-hoc network VANET; low-bandwidth communication networks; communication overhead; aggregation process; Selvi; free identity; elliptic curve cryptography; pairings; SECURE;
D O I
10.1049/iet-ifs.2019.0579
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The idea of aggregate signcryption was first proposed by Selvi. The aggregation process reduces the communication overhead and hence, it is efficient in low-bandwidth communication networks such as wireless sensor networks and vehicular ad-hoc network VANET. The goal of this study is to propose a secure provably identity based aggregate signcryption scheme ID-ASC without pairings over the elliptic curve cryptography. The proposed scheme is provable secure against confidentiality and unforgeability under random oracle model. Moreover, the proposed ID-ASC reduced the computational complexity when compared to other schemes in literature.
引用
收藏
页码:625 / 632
页数:8
相关论文
共 26 条
[1]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[2]  
Cryptology, 2002, ID BAS SIGNCR
[3]  
Cryptology, 2011, STRONG FORW SEC ID B
[4]  
Cryptology, 2009, SEC AN AGG SIGN BATC
[5]  
Cryptology, 2010, EFF PROV SEC ID BAS
[6]  
Cryptology, 2008, PROV SEC ID BAS BROA
[7]   Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model [J].
Eslami, Ziba ;
Pakniat, Nasrollah .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (03) :276-286
[8]  
Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257
[9]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[10]  
Islam SK Hafizul, 2013, Journal of Applied Mathematics and Informatics, V31, P425