期刊文献+

Multi-Receiver Signcryption Scheme with Multiple Key Generation Centers through Public Channel in Edge Computing 被引量:1

下载PDF
导出
摘要 The emerging edge computing technology for the Internet of Things has been playing an important role in our daily life. It is promising to utilize a multi-receiver signcryption scheme to protect the transmission data when an edge device broadcasts its sensing data to many different end devices at a time.There are several things to consider when we design a signcryption scheme. First existing schemes need to maintain a secure channel to generate the user private key, which may increase economic costs. Second the system private key of those schemes is kept secret by a single key generation center(KGC), and the single point of failure of KGC may compromise the whole system. For this, we propose a multi-receiver multimessage signcryption scheme without the secure channel. Firstly the scheme allows KGC to send secrets through the public channel, which reduces maintenance costs. Secondly, to eliminate the single point of failure, the scheme utilizes multiple KGCs to manage the system private key, and updates the secret of each KGC periodically to resist advanced persistent threat attacks. We demonstrate that the proposed scheme can achieve expected security properties. Performance analysis shows that it is with shorter ciphertext length and higher efficiency.
出处 《China Communications》 SCIE CSCD 2022年第4期177-198,共22页 中国通信(英文版)
基金 supported by National Key Research and Development Program of China (2020YFB1005404) National Natural Science Foundation of China (62172010) Henan Province Higher Education Key Research Project (22A520048)。
  • 相关文献

参考文献6

二级参考文献54

  • 1韩小西,王贵林,鲍丰,任奎.针对基于离散对数多重签名方案的一种攻击[J].计算机学报,2004,27(8):1147-1152. 被引量:24
  • 2LI Fagen,HU Yupu,LIU Shuanggen.Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings[J].Wuhan University Journal of Natural Sciences,2007,12(1):17-20. 被引量:5
  • 3Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 4AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 5Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 6Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 7Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 8Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 9Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 10Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.

共引文献63

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部