Abstract
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern. Identity-based generalized signcryption scheme is one among the cryptographic tools available that offers a secure way out to meet the security needs of IIoT. Our proposal is a lightweight scheme, an efficient identity-based generalized signcryption that works as an encryption signature, or signcryption scheme using only one algorithm in a standard model. This scheme is appropriate for storage-limited environments like wireless sensor networks and smart cards due to its lightweight nature. This means that it can be implemented in a range of IIoT applications where resources are limited, without compromising on security or efficiency.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
There is no dataset used in this research, Moreover, if anything is required, contact to Mr. Tej Singh (tejsingh2009@gmail.com).
References
Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924. Springer-Verlag, Cham, pp 165–179
Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227–233
Malone-Lee J, Mao W (2003) Two birds one stone: signcryption using RSA. In: Proceedings of the Topics in Cryptology-CT-RSA’03, LNCS 2612, San Francisco, CA, USA, 13–17 April 2003; pp 210–224
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-CRYPTO’84, LNCS 196, Santa Barbara, CA, USA, 19–22 August 1984, pp 47–53
Boneh D, Franklin M (2001) identity-based encryption from the weil pairing. In: Proceedings of the Advances in Cryptology-CRYPTO’01, LNCS 2139, Santa Barbara, CA, USA, 19–23 August 2001, pp 213–229
Malone-Lee J (2002) Identity based signcryption. Cryptology ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098.
Libert B, Quisquator JJ (2003) A new identity based signcryption scheme from pairings. In: Proceedings of the IEEE Information Theory Workshop-ITW’03, Paris, France, 31 March–4 April 2003, pp 155–158
Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Proceedings of the Information Security and Cryptology-ICISC’03, LNCS 2971, Seoul, Korea, 27–28 November 2004; pp 352–369
Boyen X (2003) multipurpose identity based signcryption: a Swiss army knife for identity based cryptography. In: Proceedings of the Advance in Cryptology-CRYPTO’03, LNCS 2729, Santa Barbara, CA, USA, 17–21 August 2003, pp 383–399
Yu Y, Yang B, Sun Y, Zhu S (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31:56–62
Zhang B (2010) Cryptanalysis of an identity based signcryption scheme without random oracles. J Comput Inf Syst 6:1923–1931
Jin Z, Wen Q, Du H (2010) An improved semantically-secure identity-based signcryption scheme in the standard model. Comput Electr Eng 36:545–552
Li F, Muhaya F, Zhang M, Takagi T (2011) Efficient identity-based signcryption in the standard model. In: Proceedings of the ProvSec’11, LNCS 6980, Xi’an, China, 16–18 October 2011, pp 120– 137
Ming Y, Wang Y (2013) Cryptanalysis of an identity-based group-oriented signcryption scheme in the standard model. Softw Eng Appl 02:55–61. https://doi.org/10.12677/sea.2013.23010
Karati A, Biswas G (2016) A practical identity based signcryption scheme from bilinear pairing. In: 2016 International Conference on Advance in computing. Communications and informatics (ICACCI), IEEE, Sep. 21–24, 2016, Jaipur, India
Han YL, Yang XY, Wei P, Wang YM, Hu YP (2006) Ecgsc: Elliptic curve based generalized signcryption. In: Ubiquitous Intelligence and Computing, Third International Conference (UIC’06), pp 956–965
Wang XA, Yang XY, Han YL (2007) Provable secure generalized signcryption. Cryptology ePrint Archive. http://eprint.iacr.org/2007/173
Lal S, Kushwah P (2008) Id based generalized signcryption. Cryptology ePrint Archive. (http://eprint.iacr.org/2008/084
Yu G, Ma XX, Shen Y, Han WB (2010) Provable secure identity based generalized signcryption scheme. Theor Comput Sci 411(40–42):3614–3624
Kushwah P, Lal S (2010) Efficient generalized signcryption schemes. Cryptology ePrint Archive. http://eprint.iacr.org/2010/346
Han YL, Gui XL (2009) Adaptive secure multicast in wireless networks. Int J Commun Syst 22(9):1213–1239
Ji HF, Han WB, Zhao L (2012) Certificateless generalized signcryption. Cryptol ePrint Arch 33:962–967
Sadkhan SB, Abbas NA (2014) Privacy and security of wireless communication networks. In: Rodrigues JJPC (ed) Mobile networks and cloud computing convergence for progressive services and applications. IGI Global, Cham, pp 58–78. https://doi.org/10.4018/978-1-4666-4781-7.ch004
Zhou CX, Zhou W, Dong XW (2014) Provable certificateless generalized signcryption scheme. Des Codes Crypt 71(2):331–346
Wei GY, Shao J, Xiang Y, Zhu PP, Lu RX (2015) Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption. Inf Sci 318:111–122
Zhou CX (2015) An improved multi-receiver generalized signcryption scheme. Int J Netw Secur 17(3):340–350
Han YL, Bai YC, Fang DY, Yang XY (2015) The new attribute-based generalized signcryption scheme. Intelligent computation in big data era: International Conference of Young Computer Scientists Engineers and Educators (ICYCSEE’15). Springer, Cham, pp 353–360
Shen XQ, Yang M, Feng J (2017) Identity based generalized signcryption scheme in the standard model. Entropy 19(3):121
Surange G, Khatri P (2022) Integrated intelligent IOT forensic framework for data acquisition through open-source tools. Int J Inf Technol 14:3011–3018
Gopinath V, Rao KV, Rao SK (2023) A comprehensive analysis of IoT security towards providing a cost-effective solution: a layered approach. Int J Inf Technol 15:3813
Niranjan V, Jhamb M (2023) Design of a low-power 180 nm broadband CMOS transimpedance amplifier for bio-medical & IoT applications. Int J Inf Technol 15:2741–2745
Usoh M, Asuquo P, Ozuomba S et al (2023) A hybrid machine learning model for detecting cybersecurity threats in IoT applications. Int J Inf Technol 15:3359–3370. https://doi.org/10.1007/s41870-023-01367-8
Deshpande SN, Jogdand RM (2023) A novel scheduling algorithm development and analysis for heterogeneous IoT protocol control system to achieve SCADA optimization: a next generation post covid solution. Int J Inf Technol 15:2123–2131
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, T., Kumar, M., Gelmecha, D.J. et al. A lightweight identity based generalized signcryption scheme for secure communication in standard model. Int. j. inf. tecnol. 16, 1221–1229 (2024). https://doi.org/10.1007/s41870-023-01666-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01666-0