An efficient and provable certificate-based proxy signature scheme for IIoT environment

被引:32
|
作者
Verma, Girraj Kumar [1 ]
Singh, B. B. [2 ]
Kumar, Neeraj [3 ]
Obaidat, Mohammad S. [4 ,5 ,6 ]
He, Debiao [7 ]
Singh, Harendra [8 ]
机构
[1] Amity Univ Madhya Pradesh, Amity Sch Engn & Technol, Gwalior, India
[2] Govt KRG PG Coll, Gwalior, India
[3] Thapar Univ, Patiala, Punjab, India
[4] Fordham Univ, Bronx, NY 10458 USA
[5] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[6] Univ Jordan, KASIT, Amman, Jordan
[7] Wuhan Univ, Wuhan, Peoples R China
[8] Hindustan Coll Sci & Technol, Farah, Mathura, India
关键词
Authentication; Proxy signature; Certificate-based cryptography; Key escrow; Industrial internet of things; SECURE;
D O I
10.1016/j.ins.2020.01.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the deployment of sensors and actuators to collect and disseminate data in various applications such as e-healthcare, vehicular adhoc networks (VANETs) and smart factories has revolutionized several new communication technologies. The Internet of Things (IoT) is one of those emerging communication technologies. These revolutionary applications of IoT in industrial environment are termed as Industry 4.0 and it has vitalized the concept of Industrial IoT (IIoT). Being wireless communication, the authentication and integrity of data are the most important challenges. To mitigate these challenges, several digital signature schemes are proposed in the literature. However, due to identity-based or certificate-less construction, those schemes suffer from inborn key escrow and secret key distribution problems. To resolve such issues, the first certificate-based proxy signature (PFCBPS) scheme without pairing is proposed. The proposed PFCBPS scheme is provably secure in random oracle model (ROM). The performance comparison (in terms of computational costs of different phases and length of resulting delegation and signature) shows that the proposed PFCBPS scheme's total computational cost is 46.69 ms which is 52.24% of He et al. [8], 61.40% of Debiao et al. [5], 23.33% of Seo et al. [20], 28% of Hu et al. [9] and 36.84% of Verma and Singh [23]. Thus, it is more suitable to IIoT environment than existing competitive schemes. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [1] Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
    Zhu, Fei
    Xu, Feihong
    Yang, Xu
    Yi, Xun
    Abuadbba, Alsharif
    INFORMATION PROCESSING LETTERS, 2022, 173
  • [2] Security weakness of a certificate-based proxy signature scheme for IIoT environments
    Park, Je Hong
    Kim, Woo-Hwan
    INFORMATION PROCESSING LETTERS, 2024, 183
  • [3] A Short Certificate-based Signature Scheme with Provable Security
    Hung, Ying-Hao
    Huang, Sen-Shan
    Tseng, Yuh-Min
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 243 - 253
  • [4] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +
  • [5] An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Wang, Tao
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 72 - 82
  • [6] A New Efficient Certificate-Based Signature Scheme
    Zhang Yichen
    Li Jiguo
    Wang Zhiwei
    Yao Wei
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 776 - 782
  • [7] An efficient short certificate-based signature scheme
    Li, Jiguo
    Huang, Xinyi
    Zhang, Yichen
    Xu, Lizhong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 314 - 322
  • [8] A New Efficient Certificate-Based Signature Scheme
    ZHANG Yichen
    LI Jiguo
    WANG Zhiwei
    YAO Wei
    ChineseJournalofElectronics, 2015, 24 (04) : 776 - 782
  • [9] PROVABLE SECURE CERTIFICATE-BASED SIGNATURE SCHEME FROM BILINEAR PAIRING
    Khatoon, Shaheena
    Chen, Te-Yu
    Lee, Cheng-Chi
    Khan, Muhammad Khurram
    APPLIED AND COMPUTATIONAL MATHEMATICS, 2018, 17 (03) : 295 - 306
  • [10] Short certificate-based proxy signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12):