Efficient Extended Chaotic Map-Based IBE for Industrial Environment

被引:1
|
作者
Lee, Tian-Fu [1 ]
Huang, Yi-Chien [1 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
关键词
Security; Chebyshev approximation; Identity-based encryption; Chaotic communication; Production; Encryption; Hash functions; Public key infrastructure; chaotic map; identity-based encryption; industry; information security; KEY; ENCRYPTION;
D O I
10.1109/ACCESS.2022.3188316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys. The scheme does not require the extra device to store long-term public keys. So, it is convenient for use in practical applications, including smart industry and smart manufacturing. This study develops a novel, efficient, and secure identity-based encryption scheme using an extended Chebyshev chaotic map that has recently been demonstrated to outperform traditional cryptography, including modular exponential computations or scalar multiplications on elliptic curves. Besides demonstrating that the proposed scheme satisfies the security requirements of identity-based encryption, the simulation results of this study show that the proposed scheme requires less response time than related identity-based encryption schemes. Due to hardware limitations, not all industrial devices can load heavy computations. Therefore, the proposed identity-based encryption scheme outperforms related identity-based encryption approaches, and is suitable for industrial environment.
引用
收藏
页码:71278 / 71283
页数:6
相关论文
共 50 条
  • [31] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [32] An Arnold Cat Map-Based Chaotic Approach for Securing Voice Communication
    Elzaher, Mahmoud F. Abd
    Shalaby, Mohamed
    El Ramly, Salwa H.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 329 - 331
  • [33] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    Wireless Personal Communications, 2018, 98 : 1135 - 1154
  • [34] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Lee, Tian-Fu
    Lin, Ching-Ying
    Lin, Chun-Li
    Hwang, Tzonelih
    NONLINEAR DYNAMICS, 2015, 82 (1-2) : 29 - 38
  • [35] Chaotic map-based three-party authenticated key agreement
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2469 - 2474
  • [36] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Tian-Fu Lee
    Ching-Ying Lin
    Chun-Li Lin
    Tzonelih Hwang
    Nonlinear Dynamics, 2015, 82 : 29 - 38
  • [37] Variability Analysis of Tent Map-Based Chaotic-Map Truly Random Number Generators
    Nejati, Hamid
    Beirami, Ahmad
    Sahebi, Aria Ghassemian
    Ali, Warsame H.
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 157 - 160
  • [38] Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie-Hellman assumption
    Lee, Tian-Fu
    NONLINEAR DYNAMICS, 2015, 81 (04) : 2071 - 2078
  • [39] An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Meshram, Sarita Gajbhiye
    Li, Chun-Ta
    SOFT COMPUTING, 2019, 23 (16) : 6937 - 6946
  • [40] An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Sarita Gajbhiye Meshram
    Chun-Ta Li
    Soft Computing, 2019, 23 : 6937 - 6946