A lightweight identity based generalized signcryption scheme for secure communication in standard model

被引:0
作者
Singh T. [1 ]
Kumar M. [2 ]
Gelmecha D.J. [3 ]
Thakur G.K. [1 ]
Tyagi V. [4 ]
Sori W.J. [5 ]
机构
[1] Department of Applied Sciences, ABES Engineering College, UP, Ghaziabad
[2] Institute of Applied Sciences & Humanities, GLA University, UP, Mathura
[3] Department of Electronics and Communication Engineering, School of Electrical Engineering and Computing, Adama Science and Technology University, Adama
[4] Department of CSE, IMS Engineering College, UP, Ghaziabad
[5] Department of Computer Science, School of Electrical Engineering and Computing, Adama Science and Technology University, Adama
关键词
Bilinear Pairing; Generalized signcryption; Identity-based cryptography; Signcryption;
D O I
10.1007/s41870-023-01666-0
中图分类号
学科分类号
摘要
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern. Identity-based generalized signcryption scheme is one among the cryptographic tools available that offers a secure way out to meet the security needs of IIoT. Our proposal is a lightweight scheme, an efficient identity-based generalized signcryption that works as an encryption signature, or signcryption scheme using only one algorithm in a standard model. This scheme is appropriate for storage-limited environments like wireless sensor networks and smart cards due to its lightweight nature. This means that it can be implemented in a range of IIoT applications where resources are limited, without compromising on security or efficiency. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:1221 / 1229
页数:8
相关论文
共 33 条
[1]  
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924, pp. 165-179, (1997)
[2]  
Zheng Y., Imai H., How to construct efficient signcryption schemes on elliptic curves, Inf Process Lett, 68, pp. 227-233, (1998)
[3]  
Malone-Lee J., Mao W., Two birds one stone: Signcryption using RSA, Proceedings of the Topics in Cryptology-CT-RSA’03, LNCS 2612, San Francisco, CA, USA, 13–17 April, 2003, pp. 210-224, (2003)
[4]  
Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the Advances in Cryptology-CRYPTO’84, LNCS 196, Santa Barbara, CA, USA, 19–22 August, 1984, pp. 47-53, (1984)
[5]  
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proceedings of the Advances in Cryptology-CRYPTO’01, LNCS 2139, Santa Barbara, CA, USA, 19–23 August 2001, pp. 213-229, (2001)
[6]  
Malone-Lee J., Identity based signcryption, Cryptology Eprint Archive, Report 2002/098, (2002)
[7]  
Libert B., Quisquator J.J., A new identity based signcryption scheme from pairings, Proceedings of the IEEE Information Theory Workshop-ITW’03, Paris, France, 31 March–4 April, 2003, pp. 155-158, (2003)
[8]  
Chow S.S.M., Yiu S.M., Hui L.C.K., Chow K.P., Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, Proceedings of the Information Security and Cryptology-ICISC’03, LNCS 2971, Seoul, Korea, 27–28 November, 2004, pp. 352-369, (2004)
[9]  
Boyen X., Multipurpose identity based signcryption: A Swiss army knife for identity based cryptography, Proceedings of the Advance in Cryptology-CRYPTO’03, pp. 383-399, (2003)
[10]  
Yu Y., Yang B., Sun Y., Zhu S., Identity based signcryption scheme without random oracles, Comput Stand Interfaces, 31, pp. 56-62, (2009)