OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT

被引:0
|
作者
Zhang, Yudi [1 ,2 ]
Li, Yumei [1 ]
Zheng, Mingwu [2 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024 | 2025年 / 15053卷
基金
湖北省教育厅重点项目; 中国国家自然科学基金;
关键词
VBP Obfuscation; Identity-based Signature; Security; Privacy; NB-IoT;
D O I
10.1007/978-981-97-9053-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become pervasive in various domains and offers unprecedented convenience to society. The Narrowband Internet of Things (NB-IoT) technology is particularly well-suited for deployment in applications such as smart manufacturing, smart homes, and smart cities. However, NB-IoT requires low power consumption and network security, which pose significant challenges. While several cryptographic schemes have been proposed for NB-IoT, most of them are infeasible due to the high computing power required by the nodes. In this paper, we propose a secure obfuscation for encrypted identity-based signatures in NB-IoT. Our approach leverages the high computational power of the IoT gateway to generate an encrypted signature, while ensuring the node's private key cannot be extracted. We prove that our scheme satisfies the virtual black box (VBB) properties and is secure against attacks by semi-honest gateways. Furthermore, we implement our scheme using the Java pairing-based cryptography library (JPBC) on a laptop and a server, and our experimental results demonstrate the practicality of our scheme in IoT applications.
引用
收藏
页码:383 / 402
页数:20
相关论文
共 50 条
  • [31] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [32] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [33] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [34] Provably secure identity-based undeniable signatures with selective and universal convertibility
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 25 - 39
  • [35] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [36] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [37] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Deng, Lunzhi
    He, Xiuru
    Xia, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1525 - 1537
  • [38] A Non-orthogonal Random Access Scheme Based on NB-IoT
    Dan Wang
    Yuanyuan Qu
    Yongli Fu
    Yanjuan Yang
    Qirong Chen
    Wireless Personal Communications, 2020, 111 : 2625 - 2639
  • [39] A Non-orthogonal Random Access Scheme Based on NB-IoT
    Wang, Dan
    Qu, Yuanyuan
    Fu, Yongli
    Yang, Yanjuan
    Chen, Qirong
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (04) : 2625 - 2639
  • [40] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127