Computer Science ›› 2022, Vol. 49 ›› Issue (3): 329-337.doi: 10.11896/jsjkx.201200256

• Information Security • Previous Articles     Next Articles

New Certificateless Generalized Signcryption Scheme for Internet of Things Environment

ZHANG Zhen-chao1, LIU Ya-li1,2, YIN Xin-chun1,3   

  1. 1 College of Information Engineering,Yangzhou University,Yangzhou,Jiangsu 225127,China
    2 College of Computer Science and Technology,Jiangsu Normal University,Xuzhou,Jiangsu 221116,China
    3 Guangling College,Yangzhou University,Yangzhou,Jiangsu 225128,China
  • Received:2020-12-29 Revised:2021-05-08 Online:2022-03-15 Published:2022-03-15
  • About author:ZHANG Zhen-chao,born in 1993,postgraduate.His main research interests include public key cryptography,information security and IoT security.
    LIU Ya-li,born in 1981,Ph.D,associate professor,M.S supervisor.Her main research interests include RFID authentication and privacy protection technology,vehicular ad hoc networks,cryptographic algorithms and protocols as well as their applications to computer and network security and mobile communications.
  • Supported by:
    Young Scientists Fund of the National Natural Science Foundation of China(61702237),National Natural Science Foundation of China(61472343),Special Foundation of Promoting Science and Technology Innovation of Xuzhou City(KC18005),Natural Science Foundation of Jiangsu Province(BK20150241),Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(14KJB520010),Scientific Research Support Project for Teachers with Doctor’s Degree of Jiangsu Normal University(14XLR035) and Jiangsu Provincial Government Scholarship for Overseas Studies.

Abstract: Certificateless generalized signcryption (CLGSC) scheme has been widely applied in resource-limited IoT environments for they could not only solve the problems of the certificate management and key escrow,but also serve as encryption,signature,or signcryption scheme according to the security requirements of the network.Firstly,concrete attacks are given to prove that Karati’s scheme could not resist forgery attacks.This paper analyzes the essential reason why the adversaries can forge a valid signature or signcryption in CLGSC schemes.Then,an efficient certificateless generalized signcryption scheme without bilinear pairing is proposed.The proposed scheme is secure under the random oracle model based on the computational Diffie-Hellman problem and discrete logarithm problem.Finally,performance evaluation and comparison prove that the proposed scheme outperforms other CLGSC schemes in terms of computation cost,communication overhead and security functionalities.Therefore,the proposed scheme can provide the service of secure data transmission among resource-limited IoT devices.

Key words: Certificateless generalized signcryption, Forgery attack, Internet of things, No bilinear pairings, Provable security

CLC Number: 

  • TP309
[1]YANG Y,WU L,YIN G,et al.A survey on security and privacy issues in Internet-of-Things[J].IEEE Internet of Things Journal,2017,4(5):1250-1258.
[2]KHAN M A,SALAH K.IoT security:Review,blockchain solutions,and open challenges[J].Future Generation Computer Systems,2018,82:395-411.
[3]LIN J,YU W,ZHANG N,et al.A survey on internet of things:architecture,enabling technologies,security and privacy,and applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142.
[4]BELGUITH S,KAANICHE N,HAMMOUDEH M,et al.Proud:Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications[J].Future Generation Computer Systems,2020,111:899-918.
[5]SHAMIR A.Identity-based cryptosystems and signature sche-mes[C]//Workshop on the Theory and Application of Cryptographic Techniques.Berlin:Springer,1985:47-53.
[6]AL-RIYAMI S S,Paterson K G.Certificateless public key cryptography[C]//Advancesin Cryptology-ASIACRYPT’03.Berlin:Springer,2003:452-473.
[7]BARBOSA M,FARSHIM P.Certificateless signcryption[C]//Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security.New York:ACM,2008:369-372.
[8]LI F,HAN Y,JIN C.Certificateless online/offline signcryption for the Internet of Things[J].Wireless Networks,2017,23(1):145-158.
[9]ULLAH I,AMIN N U,ZAREEI M,et al.A lightweight andprovable secured certificateless signcryption approach for crowdsourced IIoT applications[J].Symmetry,2019,11(11):1386.
[10]LIU X,WANG Z,YE Y,et al.An efficient and practical certificateless signcryption scheme for wireless body area networks[J].Computer Communications,2020,162:169-178.
[11]NIU S,NIU L,WANG C,et al.Certificateless generalized signcryption scheme in the standard model[J].Journal on Communications,2017,38(4):35-45.
[12]ZHOU C.An improved lightweight certificateless generalizedsigncryption scheme for mobile-health system[J].International Journal of Distributed Sensor Networks,2019,15(1):1-16.
[13]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].Internatio-nal Journal of Advanced Computer Science and Applications,2019,10(4):1-7.
[14]ZHANG B,JIA Z,ZHAO C.An efficient certificateless genera-lized signcryption scheme[J].Security and Communication Networks,2018,2018(1):1-11.
[15]MANDAL S,BERA B,SUTRALA A K,et al.Certificateless-signcryption-based three-factor user access control scheme for IoT environment[J].IEEE Internet of Things Journal,2020,7(4):3184-3197.
[16]RASTEGARI P.On the security of some recently proposed certificateless signcryption schemes[C]//2020 17th International ISC Conference on Information Security and Cryptology (ISCISC).IEEE,2020:95-100.
[17]KARATI A,FAN C,HSU R,et al.Provably secure and gene-ralized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices[J].IEEE Internet of Things Journal,2019,6(6):10431-10440.
[18]LIU Z,HU Y,ZHANG X,et al.Certificateless signcryptionscheme in the standard model[J].Information Sciences,2010,180(3):452-464.
[19]ZHOU C,ZHOU W,DONG X,et al.Provable certificatelessgeneralized signcryption scheme[J].Designs,Codes and Cryptography,2014,71(2):331-346.
[20]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].InternationalJournal of Advanced Computer Science and Applications,2019,10(4):610-616.
[21]MIAO S,ZHANG F,LI S,et al.On security of a certificateless signcryption scheme[J].Information Sciences,2013,232:475-481.
[22]WAHEED A,IQBAL J,DIN N,et al.Improved cryptanalysis of provable certificateless generalized signcryption[J].Internatio-nal Journal of Advanced Computer Science and Applications,2019,10(4):610-616.
[1] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[2] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[3] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[4] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[5] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[6] LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567.
[7] WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32.
[8] WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302.
[9] LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui. IoTGuardEye:A Web Attack Detection Method for IoT Services [J]. Computer Science, 2021, 48(2): 324-329.
[10] LIU Wei, RUAN Min-jie, SHE Wei, ZHANG Zhi-hong, TIAN Zhao. PBFT Optimized Consensus Algorithm for Internet of Things [J]. Computer Science, 2021, 48(11): 151-158.
[11] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[12] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[13] NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303.
[14] LIU Shuai, CHEN Jian-hua. Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network [J]. Computer Science, 2020, 47(9): 304-310.
[15] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!