Abstract

The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.

Highlights

  • Human-centered Internet of Things (IoT) enables seamless processing of electronic transactions, healthcare information systems, efficient operation of intelligent devices, and more [1]

  • This paper presents a provably secure identity-based encryption (IBE) transformation model under the humancentered IoT contexts

  • I We demonstrate that our new model provides the same level of suitability and client-friendliness compared to the original conformable Chebyshev chaotic mapbased public key cryptography (PKC); I We show that there is no need for an extensive public key database under the new architecture; I We test the proposed ID-based system against IND-sID-CCA in the random oracle model (ROM) by employing the reductionist method

Read more

Summary

Introduction

Human-centered Internet of Things (IoT) enables seamless processing of electronic transactions, healthcare information systems, efficient operation of intelligent devices, and more [1]. There is a need for an efficient and reliable security mechanism, based on chaotic frameworks, to guarantee secure information exchange via the deployment of lightweight security schemes for application in human-centered IoT environments. In order to address this problem, there is a need to provide the requisite authentication and confidentiality based conformable Chebyshev chaotic maps (CCCM) [8] for sensitive user data before transmission over public wireless channels, which is the motivation for the current study. Chebyshev chaotic maps play significant roles in increasing the security of cryptographic schemes and decreasing the communication overhead compared to pairing, elliptic curve, etc. Conformable calculus plays a significant role in increasing the security of cryptographic schemes compared to cryptographic schemes based on chaotic maps, enabling the selection of arbitrary rational numbers γ ∈ [0, 1]. The proposed scheme requires minimum communication cost compared to the scheme reported in [8]

Contribution
Paper Organization
Related Works
Background and Materials
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call