2020
DOI: 10.1016/j.adhoc.2020.102074
|View full text |Cite
|
Sign up to set email alerts
|

A new provably secure certificateless signature scheme for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(35 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…The system-master-key is added to the pseudonym generation formula to enhance the difficulty of the attacker's forgery signature, making the s cannot be bypassed. It can be seen that in the Du et al'scheme [25], part private key SK i was calculated by the system-master-key. The malicious signer cannot calculate the value of the system-master-key and SK i through technical means, but the public key of the certificateless signature scheme is not authenticated between the signer and the verifier, the malicious signer forges the signature by forging the secret value and bypassing the unknown system-master-key.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The system-master-key is added to the pseudonym generation formula to enhance the difficulty of the attacker's forgery signature, making the s cannot be bypassed. It can be seen that in the Du et al'scheme [25], part private key SK i was calculated by the system-master-key. The malicious signer cannot calculate the value of the system-master-key and SK i through technical means, but the public key of the certificateless signature scheme is not authenticated between the signer and the verifier, the malicious signer forges the signature by forging the secret value and bypassing the unknown system-master-key.…”
Section: Methodsmentioning
confidence: 99%
“…At present, many scholars have studied signcryption technology [21][22][23][24], but no systematic scheme formed. Du et al [25] put forward a certificateless signature scheme based on elliptic curve cryptosystemc but exist a replacement key attack. We improve Du et al's scheme, propose a certificateless signcryption scheme based on an elliptic curve, and the scheme is applied to the privacy protection of the IoV.…”
Section: Introductionmentioning
confidence: 99%
“…Hussain et al [42] addressed the cyber physical attack in IoT network using CLS scheme on hyper elliptic curve cryptography. Du et al [43] proposed a new and efficient CLS scheme for resource constrained environment. Besides, Kumar et al [44] presented an identity-based signcryption method that addresses the key escrow problem in a secure video-on-streaming system.…”
Section: Related Workmentioning
confidence: 99%
“…According to the methodology given in [49], [50], we compute the average execution time (in ms) of these operations, summarized in Table 1. In Table 2, we compare the signing and verifying cost of our proposed IBS-secPKG scheme with related schemes such as Karati et al [29], Chen et al [32], Chen et al [33], Sahana et al [36], Shim et al [39], Tseng et al [38], Yang et al [40], Hussain et al [42] and Du et al [43] schemes. For signing a message, the proposed scheme takes 3𝑇 𝑆𝑀 + 1𝑇 𝐴 = 20.04 ms, whiles Karati et al [29], Chen et al [32], Chen et al [33], Sahana et al [36], Shim et al [39], Tseng et al [38], Yang et al [40], Hussain et al [42] and Du et al [43] schemes take 18.17 ms, 33.4 ms, 26.7 ms, 13.4 ms, 31.6 ms, 47.15 ms, 23 ms, 7 ms and 7 ms respectively.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…When comparing calculation cost, we refer to the execution time of the relevant cryptographic operations computed by the Refs. [43,44], as shown in Table 2. We just consider pr , psm , sm and mtp , but ignore other trivial operations.…”
Section: A Novel Clsc Scheme For Vanetsmentioning
confidence: 99%