期刊文献+

An Efficient Proxy Blind Signcryption Scheme for IoT

下载PDF
导出
摘要 Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecological data management,and other various domains.IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages.However,due to the wide-open nature of the Internet,it is important to ensure the anonymity,untraceably,confidentiality,and unforgeability of communication with efficient computational complexity and low bandwidth.We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve(HEC).Our results outperform the available schemes in terms of computational cost and communication bandwidth.The designed scheme also has the desired authentication,unforgeability of warrants and/or plaintext,confidentiality,integrity,and blindness,respectively.Further,our scheme is more suitable for devices with low computation power such as mobiles and tablets.
出处 《Computers, Materials & Continua》 SCIE EI 2022年第3期4293-4306,共14页 计算机、材料和连续体(英文)
  • 相关文献

参考文献3

二级参考文献33

  • 1SHAMIR A. Identity-Based Cryptosystems and Signature Schemes[C]// Proceedings of CRYPTO 84 on Advances in Cryptology: August 19-22, 1984. Santa Barbara, CA, USA, 1985, 196: 47- 53.
  • 2COCKS C. An Identity Based Encryption Sche- me Based on Quadratic Residues[C]//Procee- dings of the 8th IMA International Conference on Cryptography and Coding: December 17-19 2001. Cirencester, UK, 2001, 2260: 360-363.
  • 3BONEH D, FRANKLIN M K. Identity-Based En-cryption from the Weil Pairing[J]. SIAM Jour- nal on Computing, 2003, 32(3): 586-615.
  • 4AL-RIYAMi S S, PATERSON K G. Certificateless Public Key Cryptography[C]// Proceedings of ASlACRYPT 2003: November 30-December 4, 2003. Taipei, Taiwan, China, 2003: 452-473.
  • 5BAEK J, SAFAVI-NAINI R, SUSILO W. Certifi- cateless Public Key Encryption Without Pairing [J]. Lecture Notes in Computer Science (LNCS) 2005, 3650: 134-148.
  • 6SUN Yinxia, ZHANG Futai, BAEK J. Strongly Secure Certificateless Public Key Encryption Without Pairing[C]// Proceedings of the 6th International Conference on Cryptology and Network Security (CANS'07): December 8-10, 2007. Singapore, 2007: 194-208.
  • 7ZHENG Yuliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption)≤ Cost (Signature)+Cost (Encryption)[C]//Proc- eedings of the 17th Annual International Cry- ptology Conference on Advances in Cryptol- ogy (CRYPTO'97): August 17-21, 2997. Santa Barbara, California, USA, 1997: 165-179.
  • 8BAEK J, STEINFELD R, ZHENG Yuliang. Formal Proofs for the Security of Signcryption[J]. Jou- rnal of Cryptology, 2007, 20(2): 203-235.
  • 9BOYEN X. Multipurpose Identity-Based Sign- cryption: A Swiss Army Knife for Identity-Ba- sed Cryptography[C]//Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003): August 17-21, 2003. Santa Barbara, California, USA, 2003, 2729: 383-399.
  • 10CHEN Liqun, MALONE-LEE J. Improved Iden- tity-Based Signcryption[C]//Proceedings of the 8th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005): January 23-26, 2005. Les Diablerets, Switzer- land, 2005, 3386: 362-379.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部