An efficient and provable certificate-based proxy signature scheme for IIoT environment

被引:32
|
作者
Verma, Girraj Kumar [1 ]
Singh, B. B. [2 ]
Kumar, Neeraj [3 ]
Obaidat, Mohammad S. [4 ,5 ,6 ]
He, Debiao [7 ]
Singh, Harendra [8 ]
机构
[1] Amity Univ Madhya Pradesh, Amity Sch Engn & Technol, Gwalior, India
[2] Govt KRG PG Coll, Gwalior, India
[3] Thapar Univ, Patiala, Punjab, India
[4] Fordham Univ, Bronx, NY 10458 USA
[5] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[6] Univ Jordan, KASIT, Amman, Jordan
[7] Wuhan Univ, Wuhan, Peoples R China
[8] Hindustan Coll Sci & Technol, Farah, Mathura, India
关键词
Authentication; Proxy signature; Certificate-based cryptography; Key escrow; Industrial internet of things; SECURE;
D O I
10.1016/j.ins.2020.01.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the deployment of sensors and actuators to collect and disseminate data in various applications such as e-healthcare, vehicular adhoc networks (VANETs) and smart factories has revolutionized several new communication technologies. The Internet of Things (IoT) is one of those emerging communication technologies. These revolutionary applications of IoT in industrial environment are termed as Industry 4.0 and it has vitalized the concept of Industrial IoT (IIoT). Being wireless communication, the authentication and integrity of data are the most important challenges. To mitigate these challenges, several digital signature schemes are proposed in the literature. However, due to identity-based or certificate-less construction, those schemes suffer from inborn key escrow and secret key distribution problems. To resolve such issues, the first certificate-based proxy signature (PFCBPS) scheme without pairing is proposed. The proposed PFCBPS scheme is provably secure in random oracle model (ROM). The performance comparison (in terms of computational costs of different phases and length of resulting delegation and signature) shows that the proposed PFCBPS scheme's total computational cost is 46.69 ms which is 52.24% of He et al. [8], 61.40% of Debiao et al. [5], 23.33% of Seo et al. [20], 28% of Hu et al. [9] and 36.84% of Verma and Singh [23]. Thus, it is more suitable to IIoT environment than existing competitive schemes. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 156
页数:15
相关论文
共 50 条
  • [41] Efficient Certificate-based and Randomized Signature from Pairings
    Xin Xiangjun
    Xing Peixu
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 222 - 224
  • [42] RETRACTED: An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones (Retracted Article)
    Khan, Muhammad Asghar
    Ullah, Insaf
    Alsharif, Mohammed H.
    Alghtani, Abdulaziz H.
    Aly, Ayman A.
    Chen, Chien-Ming
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [43] A certificate-based proxy signature with message recovery without bilinear pairing
    Mahmoodi, Ali
    Mohajery, Javad
    Salmasizadeh, Mahmoud
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4983 - 4991
  • [44] Efficient Certificate-Based Signature Scheme for Electronic Commerce Security Using Bilinear Pairing
    Wu, Libing
    Zhang, Yubo
    Ren, Yongjun
    He, Debiao
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 1159 - 1166
  • [45] Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
    Lu, Yang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2703 - 2718
  • [46] Certificate-based signature: Security model and efficient construction
    Li, Jiguo
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wu, Qianhong
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 110 - 125
  • [47] On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
    Zhang, Jianhong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2009, 5451 : 47 - 58
  • [48] Improved certificate-based signature scheme without random oracles
    Lu, Yang
    Li, Jiguo
    IET INFORMATION SECURITY, 2016, 10 (02) : 80 - 86
  • [49] Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT
    Gao, Yan
    Deng, Lunzhi
    Liu, Huan
    Li, Binhan
    Wang, Na
    INFORMATION SCIENCES, 2025, 690
  • [50] Certificate-based forward secure signature scheme without pairings
    School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
    Tiedao Xuebao, 2013, 11 (45-50):