Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

被引:133
作者
Karati, Arijit [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Vijayakumar, Pandi [5 ]
Karuppiah, Marimuthu [6 ]
机构
[1] NIIT Univ, Dept Comp Sci & Engn, Neemrana 301705, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
Crowdsourcing; digital signature; Industrial Internet of Things (IIoT); provable security; signcryption;
D O I
10.1109/JIOT.2017.2741580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data in the cloud in order to reduce the cost for sharing data and computation. However, the privacy of such crowd-sourced data in this environment has attracted wide attention across the globe. Signcryption is the significant cryptographic primitive that meets both requirement of authenticity and confidentiality of crowdsourced data among users/industries, and thus, it is ideal for ensuring secure authentic data storage and transmission in industrial crowdsourcing environments. In this paper, we introduce a new identity-based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. Besides, two hard problems are studied, called as, modified bilinear Diffie-Hellman inversion (MBDHI) assumption and modified bilinear strong Diffie-Hellman (MBSDH) assumption. The rigorous security analysis demonstrates that our IBSC scheme for IIoT is provably secure based on the intractability of decisional-MBDHI and MBSDH assumptions under formal security model without considering the concept of the random oracle. The performance comparison with other signcryption schemes shows satisfactory results. Thus, our IBSC scheme is appropriate for IIoT crowdsourcing environments, and also applicable for low-bandwidth communications.
引用
收藏
页码:2904 / 2914
页数:11
相关论文
共 53 条
[1]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[2]  
[Anonymous], 2007, PBC LIB PAIRING BASE
[3]  
[Anonymous], IACR CRYPTOL EPRINT
[4]  
[Anonymous], 2003, INFORM SECURITY CRYP
[5]  
[Anonymous], 2013, IACR Cryptology ePrint Archive
[6]  
[Anonymous], 1997, Handbook of Applied Cryptography
[7]  
[Anonymous], 2014, P INFORM THEORY APPL, DOI DOI 10.1109/ITA.2014.6804213
[8]  
Ashton K., 2009, RFID J, V22, P97, DOI DOI 10.1016/J.AMJCARD.2013.11.014
[9]   Formal proofs for the security of signcryption [J].
Baek, Joonsang ;
Steinfeld, Ron ;
Zheng, Yuliang .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :203-235
[10]  
Bar Amin Ranj, 2013, CONFIDENTIALITY INTE