Abstract

The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Furthermore, in a cloud-based environment, it is difficult to track a group’s key escrow and secret key generations. We improve group signature security, an identity-based method, to address these problems. The strategy asks a member to sign documents on the group’s behalf. The group manager (GM) membership is controlled by two protocols: join and revoke. The GM may utilize the Open protocol to determine who signed a communication. The classic ID-Based Group Signature (IDBGS) method uses a public-key generator (PKG). This method is founded on difficult mathematical ideas like the computational Diffie–Hellman assumptions. Based on the ID-Based GS system, this technique enhances group members’ identity, legitimacy and visibility. The public key size and signature depend on the group members’ autonomy. The improved method guarantees realistic confirmation of nodes and fortifies them against forgery attempts. This solution promises faster execution and increased dependability for secure nodes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call