Abstract

Driven by new situation of “Internet +,” Internet has achieved the integrated development with all walks of life. Among them, the fifth generation is a key technology to promote the deep integration of Internet-of-Things equipment, cloud computing, blockchain and other trades. Hence, it is necessary for IoTs to consider the cost and efficiency of authentication and confidentiality of the communication. For effectively solving the above problems, we devise certificateless elliptic curve aggregate signcryption (CL-ECASC) scheme for IoTs that can improve the authentication efficiency, realize data confidentiality, and avoid the problems of complex certificate management and key escrow. Under the hardness of discrete logarithm and computational DiffieHellman problems on elliptic curve, CL-ECASC is proved to has the IND-CCA2 security (indistinguishability under the adaptive chosen-ciphertext attacks) and UF-CMA security (existentially unforgeable under the adaptive chosen-message attacks). CL-ECASC has relatively faster computation efficiency and lower communication cost, and so it is suitable for secure transmission of the information in the previously mentioned environments.

Highlights

  • F IFTH generation (5G) is still early stage of development at present, but its security is facing various challenges

  • Aggregate signcryption (ASC) is introduced to solve the authentication problem of terminal and network, and the signcrypted ciphertexts generated by multiple terminals are aggregated into a ciphertext without the need of a trusted third party

  • Constructing efficient and secure CL-aggregate signcryption (ASC) scheme based on Elliptic curve cryptosystem (ECC) is a critical problem

Read more

Summary

INTRODUCTION

F IFTH generation (5G) is still early stage of development at present, but its security is facing various challenges. AS has broad applications in 5G environment, wireless networks, cloud computing, IoTs and electronic medical. Yi et al [8] devised new CL-ASC scheme for wireless sensor network. Zhang et al [9] devised publicly verifiable and efficient CL-ASC scheme. Eslami and Pakniat [10] devised provably secure CLASC scheme from pairings. Zhang et al [11] devised efficient CL-ASC scheme with inside security. CL-ASC framework in [12] can be applied to IoTs. Elhoseny and Shankar [13] combine signcryption technique with aggregation to devise reliable data transmission model. Constructing efficient and secure CL-ASC scheme based on ECC is a critical problem

Our Contribution
Elliptic Curve Cryptography
Elliptic Curve Hard Problems
Security Models
A CL-ECASC includes six algorithms as follows
Extract
Signcrypt
Unsigncrypt
Unforgeability
EFFICIENCY COMPARISON
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call