2018
DOI: 10.3390/sym10110580
|View full text |Cite
|
Sign up to set email alerts
|

A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments

Abstract: With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure a user’s privacy when his/her messages are routed via an untrusted intermediate device. Strong designated-verifier proxy re-signature (SDVPRS) is a new cryptographic technology that combines the advantages of strong designated verifier signature and proxy re-signat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 46 publications
0
9
0
Order By: Relevance
“…Therefore, these two schemes have higher security than other schemes [4,40,41,42,44,46,47]. Our scheme and Yang et al’s scheme [48] use CLS and SDVPRS respectively to guarantee the integrity and authenticity of data in IoT. We compare the signature generation and verification overhead of two schemes, and the corresponding results are shown in Figure 7 and Figure 8.…”
Section: Application In Iot Environments and Performance Analysismentioning
confidence: 95%
See 3 more Smart Citations
“…Therefore, these two schemes have higher security than other schemes [4,40,41,42,44,46,47]. Our scheme and Yang et al’s scheme [48] use CLS and SDVPRS respectively to guarantee the integrity and authenticity of data in IoT. We compare the signature generation and verification overhead of two schemes, and the corresponding results are shown in Figure 7 and Figure 8.…”
Section: Application In Iot Environments and Performance Analysismentioning
confidence: 95%
“…A scheme in the random oracle model usually has a higher computational performance, but its security depends on the ideal random oracle. Both our scheme and Yang et al’s [48] scheme are provable in the standard model, and their security only depends on the difficulty of the associated mathematical problems. Therefore, these two schemes have higher security than other schemes [4,40,41,42,44,46,47].…”
Section: Application In Iot Environments and Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…To capture this issue, the security notion of non-delegatability was proposed and formalized. Due to these unique properties above, the SDVS can help resolve the conflict between authentication and privacy protection in digital signatures, thus fit into various cryptographic applications and some new fields, such as IoT communications [7], biometric authentication and identity-management [8], privacy preserving cloud computing, the next-generation network infrastructure [9], and so on.…”
Section: Introductionmentioning
confidence: 99%