An efficient and provable certificate-based proxy signature scheme for IIoT environment

被引:32
|
作者
Verma, Girraj Kumar [1 ]
Singh, B. B. [2 ]
Kumar, Neeraj [3 ]
Obaidat, Mohammad S. [4 ,5 ,6 ]
He, Debiao [7 ]
Singh, Harendra [8 ]
机构
[1] Amity Univ Madhya Pradesh, Amity Sch Engn & Technol, Gwalior, India
[2] Govt KRG PG Coll, Gwalior, India
[3] Thapar Univ, Patiala, Punjab, India
[4] Fordham Univ, Bronx, NY 10458 USA
[5] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[6] Univ Jordan, KASIT, Amman, Jordan
[7] Wuhan Univ, Wuhan, Peoples R China
[8] Hindustan Coll Sci & Technol, Farah, Mathura, India
关键词
Authentication; Proxy signature; Certificate-based cryptography; Key escrow; Industrial internet of things; SECURE;
D O I
10.1016/j.ins.2020.01.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the deployment of sensors and actuators to collect and disseminate data in various applications such as e-healthcare, vehicular adhoc networks (VANETs) and smart factories has revolutionized several new communication technologies. The Internet of Things (IoT) is one of those emerging communication technologies. These revolutionary applications of IoT in industrial environment are termed as Industry 4.0 and it has vitalized the concept of Industrial IoT (IIoT). Being wireless communication, the authentication and integrity of data are the most important challenges. To mitigate these challenges, several digital signature schemes are proposed in the literature. However, due to identity-based or certificate-less construction, those schemes suffer from inborn key escrow and secret key distribution problems. To resolve such issues, the first certificate-based proxy signature (PFCBPS) scheme without pairing is proposed. The proposed PFCBPS scheme is provably secure in random oracle model (ROM). The performance comparison (in terms of computational costs of different phases and length of resulting delegation and signature) shows that the proposed PFCBPS scheme's total computational cost is 46.69 ms which is 52.24% of He et al. [8], 61.40% of Debiao et al. [5], 23.33% of Seo et al. [20], 28% of Hu et al. [9] and 36.84% of Verma and Singh [23]. Thus, it is more suitable to IIoT environment than existing competitive schemes. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [21] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things
    Qiao, Zirui
    Zhou, Yanwei
    Yang, Bo
    Zhang, Mingwu
    Wang, Tao
    Xia, Zhe
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730
  • [22] A pairing-free key-insulated certificate-based signature scheme with provable security
    Xiong, Hu
    Wu, Shikun
    Geng, Ji
    Ahene, Emmanuel
    Wu, Songyang
    Qin, Zhiguang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (03): : 1246 - 1259
  • [23] An efficient certificate-based verifiable encrypted signature scheme without pairings
    Huang, Rufen, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [24] An efficient certificate-based verifiable encrypted signature scheme without pairings
    Huang, Rufen
    Nong, Qiang
    Open Cybernetics and Systemics Journal, 2014, 8 (01): : 239 - 247
  • [25] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [26] Efficient Certificate-Based Blind Signature Scheme Without Bilinear Pairings
    Huang, Rufen
    Nong, Qiang
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2735 - 2739
  • [27] Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security
    Gao, Wei
    Wang, Guilin
    Chen, Kefei
    Wang, Xueli
    INFORMATICA, 2017, 28 (02) : 215 - 235
  • [28] Certificate-based signature scheme in the standard model
    Zhou, Caixue
    Cui, Zongmin
    IET INFORMATION SECURITY, 2017, 11 (05) : 256 - 260
  • [29] A Certificate-Based Provable Data Possession Scheme in the Standard Model
    Zhou, Caixue
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [30] An efficient anonymous proxy signature scheme with provable security
    Yu, Yong
    Xu, Chunxiang
    Huang, Xinyi
    Mu, Yi
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 348 - 353