Efficient Extended Chaotic Map-Based IBE for Industrial Environment

被引:1
|
作者
Lee, Tian-Fu [1 ]
Huang, Yi-Chien [1 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
关键词
Security; Chebyshev approximation; Identity-based encryption; Chaotic communication; Production; Encryption; Hash functions; Public key infrastructure; chaotic map; identity-based encryption; industry; information security; KEY; ENCRYPTION;
D O I
10.1109/ACCESS.2022.3188316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys. The scheme does not require the extra device to store long-term public keys. So, it is convenient for use in practical applications, including smart industry and smart manufacturing. This study develops a novel, efficient, and secure identity-based encryption scheme using an extended Chebyshev chaotic map that has recently been demonstrated to outperform traditional cryptography, including modular exponential computations or scalar multiplications on elliptic curves. Besides demonstrating that the proposed scheme satisfies the security requirements of identity-based encryption, the simulation results of this study show that the proposed scheme requires less response time than related identity-based encryption schemes. Due to hardware limitations, not all industrial devices can load heavy computations. Therefore, the proposed identity-based encryption scheme outperforms related identity-based encryption approaches, and is suitable for industrial environment.
引用
收藏
页码:71278 / 71283
页数:6
相关论文
共 50 条
  • [21] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Mishra, Dheerendra
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [22] Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5278 - 5294
  • [23] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Dheerendra Mishra
    Jangirala Srinivas
    Sourav Mukhopadhyay
    Journal of Medical Systems, 2014, 38
  • [24] Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP
    Mahor V.K.
    Padmavathy R.
    Chatterjee S.
    International Journal of Security and Networks, 2022, 17 (01) : 39 - 47
  • [25] Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption
    Tian-Fu Lee
    Nonlinear Dynamics, 2015, 81 : 2071 - 2078
  • [26] SFVCC: Chaotic map-based security framework for vehicular cloud computing
    Mishra, Dheerendra
    Kumar, Vinod
    Dharminder, Dharminder
    Rana, Saurabh
    IET INTELLIGENT TRANSPORT SYSTEMS, 2020, 14 (04) : 241 - 249
  • [27] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [28] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [29] Chaotic map-based selective image encryption via diffusion and confusion
    Paliwal, Mrinal
    Soni, Punit
    Kumar, Rajender
    Goyal, Ankur
    Malik, Meena
    Goyal, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 763 - 773
  • [30] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37