Abstract

Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. However, compromised fog nodes controlled by an adversary might inject bogus data to cheat or confuse remote servers. It also causes the waste of communication and computation resources. To further control the lifetime of signing capability for fog nodes, an appropriate mechanism is crucial. In this article, the author proposes a time-constrained strong multi-designated verifier signature scheme to meet the above requirement. In particular, a conventional non-delegatable strong multi-designated verifier signature scheme with low computation is first given. Based on its constructions, we show how to transform it into a time-constrained variant. The unforgeability of the proposed schemes is formally proved based on the famous elliptic curve discrete logarithm assumption. The security requirement of strong signer ambiguity for our substantial constructions is also analyzed by utilizing the intractable assumption of decisional Diffie–Hellman. Moreover, some comparisons in terms of the signature size and computational costs for involved entities among related mechanisms are made.

Highlights

  • Enterprises utilize a centralized database to arrange information technology (IT) resources

  • We present the proposed strong multi-designated verifier signature (SMDVS) schemes in section ‘‘The proposed SMDVS schemes.’’ Some essential security proofs and the evaluation of efficiency will be demonstrated in sections ‘‘Proof of security and performance analysis’’ and ‘‘Efficiency analysis.’’ Eventually, a conclusion to highlight the significance of this article is presented in section ‘‘Conclusion.’’

  • For facilitating the security applications in Internet of things (IoT)-based collaborative fog computing systems, this article came up with two new non-delegatable SMDVS schemes based on bilinear pairings

Read more

Summary

Introduction

Enterprises utilize a centralized database to arrange information technology (IT) resources. In an information-centric future Internet, the techniques of fog computing–enabled cognitive network function virtualization are crucial. In 2019, Wu et al.[2] presented a virtualization scheme for on-demand caching functions and came up with a forwarding approach for future Internet nodes and fog nodes. They addressed a cognitive resource configuration method based on their virtualization architecture. In modern cryptosystems,[3,4] the technique of digital signature schemes plays a crucial role in modern era Such a scheme provides many important properties such as non-repudiation, authenticity along with data integrity. A verifying group is able to generate valid transcripts which are computationally indistinguishable from an original one and are designated for themselves

Related works
Computability
G2 P e
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.