Efficient Extended Chaotic Map-Based IBE for Industrial Environment

被引:1
|
作者
Lee, Tian-Fu [1 ]
Huang, Yi-Chien [1 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
关键词
Security; Chebyshev approximation; Identity-based encryption; Chaotic communication; Production; Encryption; Hash functions; Public key infrastructure; chaotic map; identity-based encryption; industry; information security; KEY; ENCRYPTION;
D O I
10.1109/ACCESS.2022.3188316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys. The scheme does not require the extra device to store long-term public keys. So, it is convenient for use in practical applications, including smart industry and smart manufacturing. This study develops a novel, efficient, and secure identity-based encryption scheme using an extended Chebyshev chaotic map that has recently been demonstrated to outperform traditional cryptography, including modular exponential computations or scalar multiplications on elliptic curves. Besides demonstrating that the proposed scheme satisfies the security requirements of identity-based encryption, the simulation results of this study show that the proposed scheme requires less response time than related identity-based encryption schemes. Due to hardware limitations, not all industrial devices can load heavy computations. Therefore, the proposed identity-based encryption scheme outperforms related identity-based encryption approaches, and is suitable for industrial environment.
引用
收藏
页码:71278 / 71283
页数:6
相关论文
共 50 条
  • [1] An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
    Yu, Yicheng
    Taylor, Oliver
    Li, Rui
    Sunagawa, Baiho
    MATHEMATICS, 2021, 9 (08)
  • [2] An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
    Zhou, Yousheng
    Zhou, Junfeng
    Wang, Feng
    Guo, Feng
    APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2016, 2016
  • [3] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [4] CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
    Tanveer, Muhammad
    Badshah, Akhtar
    Khan, Abd Ullah
    Alasmary, Hisham
    Chaudhry, Shehzad Ashraf
    INTERNET OF THINGS, 2023, 23
  • [5] A Concept Map-based Cognitive Framework for Acquiring Expert Knowledge in Industrial Environment
    Lin, Yuetong
    Shahhosseini, A. Mehran
    Badar, M. Affan
    Foster, Tad
    Dean, Jason
    2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2016,
  • [6] Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1133 - 1146
  • [7] Chaotic oscillations in a map-based model of neural activity
    Courbage, M.
    Nekorkin, V. I.
    Vdovin, L. V.
    CHAOS, 2007, 17 (04)
  • [8] Periodic and chaotic dynamics in a map-based neuron model
    Trujillo, Frank Llovera
    Signerska-Rynkowska, Justyna
    Bartlomiejczyk, Piotr
    MATHEMATICAL METHODS IN THE APPLIED SCIENCES, 2023, 46 (11) : 11906 - 11931
  • [9] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    Journal of Medical Systems, 2021, 45
  • [10] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder, Dharminder
    Kundu, Nibedita
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (08)