Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring

被引:1
作者
Muthukumaran, V [1 ]
Manimozhi, I [2 ]
Sundar, Praveen P., V [3 ]
Karthikeyan, T. [4 ]
Gopu, Magesh [5 ]
机构
[1] REVA Univ, Bengaluru, India
[2] East Point Coll Engn & Technol, Bengaluru, India
[3] Adhiparasakthi Coll Arts & Sci, Kalavai, India
[4] Sri Balaji Chockalingam Engn Coll, Irumbedu, India
[5] Vellore Inst Technol, Chennai, Tamil Nadu, India
关键词
Equality Test; Industrial Internet of Things (IIoT); Internet of Things (IoT); Near-Ring; Public Key Encryption; IDENTITY-BASED ENCRYPTION;
D O I
10.4018/IJeC.2021070102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations have moved from the conventional industries to smart industries by embracing the approach of industrial internet of things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies. In this context, this work presents a public key encryption with equality test based on DLP with decomposition problems over near-ring. The proposed method is highly secure, and it solves the problem of quantum algorithm attacks in industrial internet of thing systems. Further, the proposed system is highly secure, and it prevents the chosen-ciphertext attack in type-I adversary and it is indistinguishable against the random oracle model for the type-II adversary. The proposed scheme is highly secure, and the security analysis measures are comparatively stronger than existing techniques.
引用
收藏
页码:25 / 45
页数:21
相关论文
共 25 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
  • [2] AlRiyami S. S., 2003, J SUPERCOMPUT, V72, P1494
  • [3] [Anonymous], 2018, J AMBIENT INTELL HUM
  • [4] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [5] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    [J]. IEEE ACCESS, 2019, 7 : 68957 - 68969
  • [8] Cloud Manufacturing: Security, Privacy and Forensic Concerns
    Esposito, Christian
    Castiglione, Aniello
    Martini, Ben
    Choo, Kim-Kwang Raymond
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 16 - 22
  • [9] Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
    Gope, Prosanta
    Das, Ashok Kumar
    Kumar, Neeraj
    Cheng, Yongqiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) : 4957 - 4968
  • [10] An efficient certificateless user authentication and key exchange protocol for client-server environment
    Hassan, Alzubair
    Eltayieb, Nabeil
    Elhabob, Rashad
    Li, Fagen
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (06) : 1713 - 1727