Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

被引:114
|
作者
Karati, Arijit [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Vijayakumar, Pandi [5 ]
Karuppiah, Marimuthu [6 ]
机构
[1] NIIT Univ, Dept Comp Sci & Engn, Neemrana 301705, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
关键词
Crowdsourcing; digital signature; Industrial Internet of Things (IIoT); provable security; signcryption;
D O I
10.1109/JIOT.2017.2741580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data in the cloud in order to reduce the cost for sharing data and computation. However, the privacy of such crowd-sourced data in this environment has attracted wide attention across the globe. Signcryption is the significant cryptographic primitive that meets both requirement of authenticity and confidentiality of crowdsourced data among users/industries, and thus, it is ideal for ensuring secure authentic data storage and transmission in industrial crowdsourcing environments. In this paper, we introduce a new identity-based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. Besides, two hard problems are studied, called as, modified bilinear Diffie-Hellman inversion (MBDHI) assumption and modified bilinear strong Diffie-Hellman (MBSDH) assumption. The rigorous security analysis demonstrates that our IBSC scheme for IIoT is provably secure based on the intractability of decisional-MBDHI and MBSDH assumptions under formal security model without considering the concept of the random oracle. The performance comparison with other signcryption schemes shows satisfactory results. Thus, our IBSC scheme is appropriate for IIoT crowdsourcing environments, and also applicable for low-bandwidth communications.
引用
收藏
页码:2904 / 2914
页数:11
相关论文
共 50 条
  • [21] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [22] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [23] Provably Secure Aggregate Signcryption Scheme
    Ren, Xun-Yi
    Qi, Zheng-Hua
    Geng, Yang
    ETRI JOURNAL, 2012, 34 (03) : 421 - 428
  • [24] Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things
    Naresh, Vankamamidi Srinivasa
    Reddi, Sivaranjani
    Kumari, Saru
    Allavarpu, V. V. L. Divakar
    Kumar, Sachin
    Yang, Ming-Hour
    IEEE ACCESS, 2021, 9 : 21267 - 21278
  • [25] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [26] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,
  • [27] Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
    Li, Xiangxue
    Qian, Haifeng
    Weng, Jian
    Yu, Yu
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 503 - 511
  • [28] An improved semantically-secure identity-based signcryption scheme in the standard model
    Jin, Zhengping
    Wen, Qiaoyan
    Du, Hongzhen
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 545 - 552
  • [29] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [30] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242