Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

被引:114
|
作者
Karati, Arijit [1 ]
Islam, S. K. Hafizul [2 ]
Biswas, G. P. [3 ]
Bhuiyan, Md Zakirul Alam [4 ]
Vijayakumar, Pandi [5 ]
Karuppiah, Marimuthu [6 ]
机构
[1] NIIT Univ, Dept Comp Sci & Engn, Neemrana 301705, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
[4] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[6] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
关键词
Crowdsourcing; digital signature; Industrial Internet of Things (IIoT); provable security; signcryption;
D O I
10.1109/JIOT.2017.2741580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data in the cloud in order to reduce the cost for sharing data and computation. However, the privacy of such crowd-sourced data in this environment has attracted wide attention across the globe. Signcryption is the significant cryptographic primitive that meets both requirement of authenticity and confidentiality of crowdsourced data among users/industries, and thus, it is ideal for ensuring secure authentic data storage and transmission in industrial crowdsourcing environments. In this paper, we introduce a new identity-based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. Besides, two hard problems are studied, called as, modified bilinear Diffie-Hellman inversion (MBDHI) assumption and modified bilinear strong Diffie-Hellman (MBSDH) assumption. The rigorous security analysis demonstrates that our IBSC scheme for IIoT is provably secure based on the intractability of decisional-MBDHI and MBSDH assumptions under formal security model without considering the concept of the random oracle. The performance comparison with other signcryption schemes shows satisfactory results. Thus, our IBSC scheme is appropriate for IIoT crowdsourcing environments, and also applicable for low-bandwidth communications.
引用
收藏
页码:2904 / 2914
页数:11
相关论文
共 50 条
  • [31] A novel and provably secure identity-based blind signature scheme for online transactions
    Sunil Kumar
    Gaurav Mittal
    Arvind Yadav
    Sādhanā, 50 (2)
  • [32] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [33] A new identity-based ring signcryption scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Li, Siwei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 333 - 342
  • [35] An improved identity-based KCDSA signcryption scheme
    Li, Fagen
    Xu, Chunxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 230 - +
  • [36] A new identity-based ring signcryption scheme
    Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [37] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54
  • [38] Secure universal designated verifier identity-based signcryption
    Lin, Changlu
    Tang, Fei
    Ke, Pinhui
    Harn, Lein
    Zhang, Shengyuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 434 - 444
  • [39] A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things
    Gong, Bei
    Wu, Yong
    Wang, Qian
    Ren, Yu-heng
    Guo, Chong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 23 - 30
  • [40] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +