PUF-Based Multi-Receiver Anonymous Signcryption Scheme in Edge Computing

被引:0
|
作者
Li, Sen-Sen [1 ]
Liu, Yan-Jiang [1 ]
Yu, Bin [1 ]
Li, Jun-Quan [1 ]
机构
[1] PLA Information Engineering University, Henan, Zhengzhou,450001, China
来源
基金
中国国家自然科学基金;
关键词
Computational geometry - Digital storage - Edge computing - Hardware security - Network security - Public key cryptography - Secure communication;
D O I
10.12263/DZXB.20231181
中图分类号
学科分类号
摘要
Edge computing extends some tasks of center cloud server to the edge of the network, which can effectively alleviate the problems of high computation overhead and long processing latency caused by massive devices and data in the era of Internet of Everything. In edge computing environment, edge nodes and terminal devices are usually deployed in the unattended and open places, making them vulnerable to physical attacks while facing traditional security threats. To achieve secure communication in edge computing, several multi-receiver signcryption schemes with high communication efficiency have been proposed. However, there are still two issues with the application of existing schemes in areas with high security requirements: (1) no prevention mechanism for physical attacks is provided; (2) the anonymity protection for the senders has not been implemented. To fill this gap, we propose an efficient multi-receiver and multi-message signcryption scheme based on the hardware security primitive physical unclonable function (PUF) in this paper. Combining PUF with certificateless public key cryptography (CL-PKC) on elliptic curve, the proposed scheme does not need to use bilinear pairings with high computational complexity and is free from the key escrow problem. The security analysis shows that the scheme can effectively prevent physical attacks while possessing security attributes including confidentiality, unforgeability, and anonymity. Compared with related schemes, the proposed scheme achieves higher security with lower communication overhead without significantly increasing the computation overhead, which can better meet the requirements of secure communication in edge computing. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:4087 / 4100
相关论文
共 50 条
  • [31] NMIBAS: A NOVEL MULTI-RECEIVER ID-BASED ANONYMOUS SIGNCRYPTION WITH DECRYPTION FAIRNESS
    Pang, Liaojun
    Li, Huixian
    Wang, Yumin
    COMPUTING AND INFORMATICS, 2013, 32 (03) : 441 - 460
  • [32] On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs
    Dong, Chenghe
    Zhang, Jianhong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4302 - 4303
  • [33] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [34] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300
  • [35] An improved anonymous multi-receiver identity-based encryption scheme
    Zhang, Jianhong
    Mao, Jian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 645 - 658
  • [36] Multi-receiver Conditional Anonymous Signcryption Mechanism based on Multi-dimensional Decision Attributes for IoV
    Zhang, Jiangjiang
    Luo, Yihang
    2024 6TH INTERNATIONAL CONFERENCE ON BIG-DATA SERVICE AND INTELLIGENT COMPUTATION, BDSIC 2024, 2024, : 1 - 7
  • [37] Quantum Attack-Resistant Certificateless Multi-Receiver Signcryption Scheme
    Li, Huixian
    Chen, Xubao
    Pang, Liaojun
    Shi, Weisong
    PLOS ONE, 2013, 8 (06):
  • [38] EFFICIENT MULTI-RECEIVER HETEROGENOUS SIGNCRYPTION
    Raveendranath, Saritha
    Aneesh, A.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1693 - 1697
  • [39] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [40] Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems
    Li, Yahong
    Wang, Caifen
    Zhang, Yulei
    Niu, Shufen
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4574 - 4584