OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT

被引:0
|
作者
Zhang, Yudi [1 ,2 ]
Li, Yumei [1 ]
Zheng, Mingwu [2 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024 | 2025年 / 15053卷
基金
湖北省教育厅重点项目; 中国国家自然科学基金;
关键词
VBP Obfuscation; Identity-based Signature; Security; Privacy; NB-IoT;
D O I
10.1007/978-981-97-9053-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become pervasive in various domains and offers unprecedented convenience to society. The Narrowband Internet of Things (NB-IoT) technology is particularly well-suited for deployment in applications such as smart manufacturing, smart homes, and smart cities. However, NB-IoT requires low power consumption and network security, which pose significant challenges. While several cryptographic schemes have been proposed for NB-IoT, most of them are infeasible due to the high computing power required by the nodes. In this paper, we propose a secure obfuscation for encrypted identity-based signatures in NB-IoT. Our approach leverages the high computational power of the IoT gateway to generate an encrypted signature, while ensuring the node's private key cannot be extracted. We prove that our scheme satisfies the virtual black box (VBB) properties and is secure against attacks by semi-honest gateways. Furthermore, we implement our scheme using the Java pairing-based cryptography library (JPBC) on a laptop and a server, and our experimental results demonstrate the practicality of our scheme in IoT applications.
引用
收藏
页码:383 / 402
页数:20
相关论文
共 50 条
  • [41] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [42] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [43] Efficient identity-based signatures and blind signatures
    Huang, ZJ
    Chen, KF
    Wang, YM
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 120 - 133
  • [44] An Efficient Identity-based Forward Secure Signature Scheme from Lattices
    Wu, Guang
    Huang, Ruwei
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 626 - 631
  • [45] A Secure Patient Information Access Scheme through Identity-Based Signcryption
    Cagalaban, Giovanni
    Kim, Seoksoo
    PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2011, 137 : 21 - 26
  • [46] Provably secure identity-based aggregate signcryption scheme in random oracles
    Kar, Jayaprakash
    International Journal of Network Security, 2015, 17 (05) : 580 - 587
  • [47] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [48] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Xiong Hu
    Chen YaNan
    Zhu GuoBin
    Qin ZhiGuang
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 5
  • [49] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [50] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Hu Xiong
    YaNan Chen
    GuoBin Zhu
    ZhiGuang Qin
    Science China Information Sciences, 2014, 57 : 1 - 5