OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT

被引:0
|
作者
Zhang, Yudi [1 ,2 ]
Li, Yumei [1 ]
Zheng, Mingwu [2 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024 | 2025年 / 15053卷
基金
湖北省教育厅重点项目; 中国国家自然科学基金;
关键词
VBP Obfuscation; Identity-based Signature; Security; Privacy; NB-IoT;
D O I
10.1007/978-981-97-9053-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become pervasive in various domains and offers unprecedented convenience to society. The Narrowband Internet of Things (NB-IoT) technology is particularly well-suited for deployment in applications such as smart manufacturing, smart homes, and smart cities. However, NB-IoT requires low power consumption and network security, which pose significant challenges. While several cryptographic schemes have been proposed for NB-IoT, most of them are infeasible due to the high computing power required by the nodes. In this paper, we propose a secure obfuscation for encrypted identity-based signatures in NB-IoT. Our approach leverages the high computational power of the IoT gateway to generate an encrypted signature, while ensuring the node's private key cannot be extracted. We prove that our scheme satisfies the virtual black box (VBB) properties and is secure against attacks by semi-honest gateways. Furthermore, we implement our scheme using the Java pairing-based cryptography library (JPBC) on a laptop and a server, and our experimental results demonstrate the practicality of our scheme in IoT applications.
引用
收藏
页码:383 / 402
页数:20
相关论文
共 50 条
  • [1] Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks
    Zhang, Yudi
    He, Debiao
    Li, Yumei
    Zhang, Mingwu
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5320 - 5328
  • [2] Secure Obfuscation for Encrypted Signatures
    Hada, Satoshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 92 - 112
  • [3] Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
    Cheng, Rong
    Zhang, Bo
    Zhang, Fangguo
    PROVABLE SECURITY, 2011, 6980 : 188 - 203
  • [4] Secure obfuscation for encrypted threshold signatures
    Li Y.
    Wang C.
    Zhang Y.
    Yang X.
    Huang H.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 61 - 69
  • [5] Secure Obfuscation for Encrypted Group Signatures
    Shi, Yang
    Zhao, Qinpei
    Fan, Hongfei
    Liu, Qin
    PLOS ONE, 2015, 10 (07):
  • [6] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [7] Identity-Based Verifiably Encrypted Signatures without Random Oracles
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 76 - 89
  • [8] Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
    Wahaballa, Abubaker
    ELECTRONICS, 2022, 11 (21)
  • [9] Efficient identity-based signatures secure in the standard model
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 207 - 222
  • [10] Fully secure fuzzy identity-based encryption for secure IoT communications
    Mao, Yijun
    Li, Jin
    Chen, Min-Rong
    Liu, Jianan
    Xie, Congge
    Zhan, Yiju
    COMPUTER STANDARDS & INTERFACES, 2016, 44 : 117 - 121