[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

A lightweight identity based generalized signcryption scheme for secure communication in standard model

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern. Identity-based generalized signcryption scheme is one among the cryptographic tools available that offers a secure way out to meet the security needs of IIoT. Our proposal is a lightweight scheme, an efficient identity-based generalized signcryption that works as an encryption signature, or signcryption scheme using only one algorithm in a standard model. This scheme is appropriate for storage-limited environments like wireless sensor networks and smart cards due to its lightweight nature. This means that it can be implemented in a range of IIoT applications where resources are limited, without compromising on security or efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

There is no dataset used in this research, Moreover, if anything is required, contact to Mr. Tej Singh (tejsingh2009@gmail.com).

References

  1. Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924. Springer-Verlag, Cham, pp 165–179

    Google Scholar 

  2. Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227–233

    Article  MathSciNet  Google Scholar 

  3. Malone-Lee J, Mao W (2003) Two birds one stone: signcryption using RSA. In: Proceedings of the Topics in Cryptology-CT-RSA’03, LNCS 2612, San Francisco, CA, USA, 13–17 April 2003; pp 210–224

  4. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-CRYPTO’84, LNCS 196, Santa Barbara, CA, USA, 19–22 August 1984, pp 47–53

  5. Boneh D, Franklin M (2001) identity-based encryption from the weil pairing. In: Proceedings of the Advances in Cryptology-CRYPTO’01, LNCS 2139, Santa Barbara, CA, USA, 19–23 August 2001, pp 213–229

  6. Malone-Lee J (2002) Identity based signcryption. Cryptology ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098.

  7. Libert B, Quisquator JJ (2003) A new identity based signcryption scheme from pairings. In: Proceedings of the IEEE Information Theory Workshop-ITW’03, Paris, France, 31 March–4 April 2003, pp 155–158

  8. Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Proceedings of the Information Security and Cryptology-ICISC’03, LNCS 2971, Seoul, Korea, 27–28 November 2004; pp 352–369

  9. Boyen X (2003) multipurpose identity based signcryption: a Swiss army knife for identity based cryptography. In: Proceedings of the Advance in Cryptology-CRYPTO’03, LNCS 2729, Santa Barbara, CA, USA, 17–21 August 2003, pp 383–399

  10. Yu Y, Yang B, Sun Y, Zhu S (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31:56–62

    Article  Google Scholar 

  11. Zhang B (2010) Cryptanalysis of an identity based signcryption scheme without random oracles. J Comput Inf Syst 6:1923–1931

    Google Scholar 

  12. Jin Z, Wen Q, Du H (2010) An improved semantically-secure identity-based signcryption scheme in the standard model. Comput Electr Eng 36:545–552

    Article  ADS  Google Scholar 

  13. Li F, Muhaya F, Zhang M, Takagi T (2011) Efficient identity-based signcryption in the standard model. In: Proceedings of the ProvSec’11, LNCS 6980, Xi’an, China, 16–18 October 2011, pp 120– 137

  14. Ming Y, Wang Y (2013) Cryptanalysis of an identity-based group-oriented signcryption scheme in the standard model. Softw Eng Appl 02:55–61. https://doi.org/10.12677/sea.2013.23010

    Article  Google Scholar 

  15. Karati A, Biswas G (2016) A practical identity based signcryption scheme from bilinear pairing. In: 2016 International Conference on Advance in computing. Communications and informatics (ICACCI), IEEE, Sep. 21–24, 2016, Jaipur, India

  16. Han YL, Yang XY, Wei P, Wang YM, Hu YP (2006) Ecgsc: Elliptic curve based generalized signcryption. In: Ubiquitous Intelligence and Computing, Third International Conference (UIC’06), pp 956–965

  17. Wang XA, Yang XY, Han YL (2007) Provable secure generalized signcryption. Cryptology ePrint Archive. http://eprint.iacr.org/2007/173

  18. Lal S, Kushwah P (2008) Id based generalized signcryption. Cryptology ePrint Archive. (http://eprint.iacr.org/2008/084

  19. Yu G, Ma XX, Shen Y, Han WB (2010) Provable secure identity based generalized signcryption scheme. Theor Comput Sci 411(40–42):3614–3624

    Article  MathSciNet  Google Scholar 

  20. Kushwah P, Lal S (2010) Efficient generalized signcryption schemes. Cryptology ePrint Archive. http://eprint.iacr.org/2010/346

  21. Han YL, Gui XL (2009) Adaptive secure multicast in wireless networks. Int J Commun Syst 22(9):1213–1239

    Article  Google Scholar 

  22. Ji HF, Han WB, Zhao L (2012) Certificateless generalized signcryption. Cryptol ePrint Arch 33:962–967

    Google Scholar 

  23. Sadkhan SB, Abbas NA (2014) Privacy and security of wireless communication networks. In: Rodrigues JJPC (ed) Mobile networks and cloud computing convergence for progressive services and applications. IGI Global, Cham, pp 58–78. https://doi.org/10.4018/978-1-4666-4781-7.ch004

    Chapter  Google Scholar 

  24. Zhou CX, Zhou W, Dong XW (2014) Provable certificateless generalized signcryption scheme. Des Codes Crypt 71(2):331–346

    Article  MathSciNet  Google Scholar 

  25. Wei GY, Shao J, Xiang Y, Zhu PP, Lu RX (2015) Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption. Inf Sci 318:111–122

    Article  MathSciNet  Google Scholar 

  26. Zhou CX (2015) An improved multi-receiver generalized signcryption scheme. Int J Netw Secur 17(3):340–350

    Google Scholar 

  27. Han YL, Bai YC, Fang DY, Yang XY (2015) The new attribute-based generalized signcryption scheme. Intelligent computation in big data era: International Conference of Young Computer Scientists Engineers and Educators (ICYCSEE’15). Springer, Cham, pp 353–360

    Chapter  Google Scholar 

  28. Shen XQ, Yang M, Feng J (2017) Identity based generalized signcryption scheme in the standard model. Entropy 19(3):121

    Article  ADS  Google Scholar 

  29. Surange G, Khatri P (2022) Integrated intelligent IOT forensic framework for data acquisition through open-source tools. Int J Inf Technol 14:3011–3018

    Google Scholar 

  30. Gopinath V, Rao KV, Rao SK (2023) A comprehensive analysis of IoT security towards providing a cost-effective solution: a layered approach. Int J Inf Technol 15:3813

    Google Scholar 

  31. Niranjan V, Jhamb M (2023) Design of a low-power 180 nm broadband CMOS transimpedance amplifier for bio-medical & IoT applications. Int J Inf Technol 15:2741–2745

    Google Scholar 

  32. Usoh M, Asuquo P, Ozuomba S et al (2023) A hybrid machine learning model for detecting cybersecurity threats in IoT applications. Int J Inf Technol 15:3359–3370. https://doi.org/10.1007/s41870-023-01367-8

    Article  Google Scholar 

  33. Deshpande SN, Jogdand RM (2023) A novel scheduling algorithm development and analysis for heterogeneous IoT protocol control system to achieve SCADA optimization: a next generation post covid solution. Int J Inf Technol 15:2123–2131

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Demissie Jabir Gelmecha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, T., Kumar, M., Gelmecha, D.J. et al. A lightweight identity based generalized signcryption scheme for secure communication in standard model. Int. j. inf. tecnol. 16, 1221–1229 (2024). https://doi.org/10.1007/s41870-023-01666-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01666-0

Keywords

Navigation