Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

被引:115
|
作者
Karati, Arijit [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Vijayakumar, Pandi [5 ]
Karuppiah, Marimuthu [6 ]
机构
[1] NIIT Univ, Dept Comp Sci & Engn, Neemrana 301705, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
关键词
Crowdsourcing; digital signature; Industrial Internet of Things (IIoT); provable security; signcryption;
D O I
10.1109/JIOT.2017.2741580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data in the cloud in order to reduce the cost for sharing data and computation. However, the privacy of such crowd-sourced data in this environment has attracted wide attention across the globe. Signcryption is the significant cryptographic primitive that meets both requirement of authenticity and confidentiality of crowdsourced data among users/industries, and thus, it is ideal for ensuring secure authentic data storage and transmission in industrial crowdsourcing environments. In this paper, we introduce a new identity-based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. Besides, two hard problems are studied, called as, modified bilinear Diffie-Hellman inversion (MBDHI) assumption and modified bilinear strong Diffie-Hellman (MBSDH) assumption. The rigorous security analysis demonstrates that our IBSC scheme for IIoT is provably secure based on the intractability of decisional-MBDHI and MBSDH assumptions under formal security model without considering the concept of the random oracle. The performance comparison with other signcryption schemes shows satisfactory results. Thus, our IBSC scheme is appropriate for IIoT crowdsourcing environments, and also applicable for low-bandwidth communications.
引用
收藏
页码:2904 / 2914
页数:11
相关论文
共 50 条
  • [1] Provably secure identity-based aggregate signcryption scheme in random oracles
    Kar, Jayaprakash
    [J]. International Journal of Network Security, 2015, 17 (05) : 580 - 587
  • [2] PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments
    Dharminder, Dharminder
    Mishra, Dheerendra
    Rodrigues, Joel J. P. C.
    Rabelo, Ricardo de A. L.
    Saleem, Kashif
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (03): : 744 - 755
  • [3] A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
    Hussain, Saddam
    Ullah, Insaf
    Khattak, Hizbullah
    Khan, Muhammad Asghar
    Chen, Chien-Ming
    Kumari, Saru
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [4] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [5] Efficient and identity-based signcryption with provably-secure
    Wen, Yiling
    Ma, Jianfeng
    Moon, Sangjae
    [J]. International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [6] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [7] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
  • [8] Efficient and provably secure multi-receiver identity-based signcryption
    Duan, Shanshan
    Cao, Zhenfu
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 195 - 206
  • [9] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [10] A provable secure identity-based threshold proxy signcryption scheme
    [J]. Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):