A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service

被引:65
|
作者
Zheng, Qiming [1 ]
Wang, Xiaomin [1 ]
Khan, Muhammad Khurram [2 ]
Zhang, Wenfang [1 ]
Gupta, B. B. [3 ]
Guo, Wei [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
[3] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Chaos; cryptography; message authentication; encryption; Internet of Things; security; clouds; hardware; SECURITY;
D O I
10.1109/ACCESS.2017.2775038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, intelligent railway operation and maintenance using cloud technology have received wide consideration for the provision of public transport services. Under the cloud environment, information security is critical to ensure the integrity of data through protection from unauthorized manipulation and the confidentiality through protection against the leakage of sensitive information. This paper proposes a lightweight authenticated encryption scheme with associated data based on a novel discrete chaotic S-box coupled map lattice (SCML), which avoids the dynamic degradation of the digital chaotic system and low efficiency of the chaos-based cryptosystem. Based on the chaotic SCML, an authenticated encryption scheme that protects the confidentiality and integrity in one pass is presented in detail. The security analysis and performance simulations in software and hardware show that the proposed scheme is efficient and provides adequate security through authentication and encryption. Such a scheme could be used for applications in a railway cloud service that requires moderate security and low-cost implementations.
引用
收藏
页码:711 / 722
页数:12
相关论文
共 50 条
  • [31] Practical authenticated encryption scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 461 - 469
  • [32] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [33] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [34] An image encryption scheme based on chaotic systems
    Xiao, Huang-Pei
    Zhang, Guo-Ji
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2707 - +
  • [35] An Image Encryption Scheme Based on Chaotic Map
    Peng, Jun
    Jin, Shangzhu
    Chen, Guorong
    Yang, Zhiming
    Liao, Xiaofeng
    ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 4, PROCEEDINGS, 2008, : 595 - +
  • [36] A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
    Du, Haorui
    Chen, Jianhua
    Lin, Fei
    Peng, Cong
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [38] A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (02) : 351 - 359
  • [39] A division-of-labor based threshold authenticated encryption scheme
    Tan Z.-W.
    Fan Y.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1183 - 1194
  • [40] Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems
    He, Qian
    Zhang, Ning
    Wei, Yongzhuang
    Zhang, Yan
    COMPUTER NETWORKS, 2018, 140 : 163 - 173