2021
DOI: 10.3390/s21217227
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments

Abstract: The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 74 publications
0
3
0
Order By: Relevance
“…To address the flaws inherent in the traditional schemes, Zheng [11] proposed signcryption, which combines encryption and signature in a single stage. The scheme is built on the public key infrastructure (PKI) [2]. However, the procedure has certain drawbacks, such as certificate distribution, storage, and production issues.…”
Section: Introductionmentioning
confidence: 99%
“…To address the flaws inherent in the traditional schemes, Zheng [11] proposed signcryption, which combines encryption and signature in a single stage. The scheme is built on the public key infrastructure (PKI) [2]. However, the procedure has certain drawbacks, such as certificate distribution, storage, and production issues.…”
Section: Introductionmentioning
confidence: 99%
“…However, With the growing use of Chebyshev chaotic in designing lightweight asymmetric cryptographic schemes, there are other related issues that require attention, such as cryptographic models designed for existing public key cryptography (PKC) infrastructures that may need to be modified. Meshram et al [21] proposed a robust and secure identity-based encryption transformation model for PKC using CCM.…”
Section: Related Workmentioning
confidence: 99%
“…However, several drawbacks have been associated with two-factor SIP authentication schemes [21,22]; it is not unlikely that they are vulnerable to smart card loss attacks [12]. Three-factor SIP authentication schemes combine passwords, smart cards, and biometrics, which reinforces the security architecture of the schemes, making them suitable for applications in human-centered IoT environments [23][24][25]. These schemes have been used in medical decision support systems, smart homes, learning systems, and more [26,27].…”
Section: Introductionmentioning
confidence: 99%