2022
DOI: 10.1109/jsyst.2021.3096531
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless Elliptic Curve Aggregate Signcryption Scheme

Abstract: Driven by new situation of "Internet +," Internet has achieved the integrated development with all walks of life. Among them, the fifth generation is a key technology to promote the deep integration of Internet-of-Things equipment, cloud computing, blockchain and other trades. Hence, it is necessary for IoTs to consider the cost and efficiency of authentication and confidentiality of the communication. For effectively solving the above problems, we devise certificateless elliptic curve aggregate signcryption (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…In VANETs, ensuring the confidentiality, validity, and vehicle identity of messages is crucial, and achieving fast authentication in resource-constrained environments is also essential. Due to the fact that the schemes in [19,23,[28][29][30] basically have the above functions, it is more meaningful to compare the proposed schemes with them in the context of vehicle networking. However, based on the scheme in [23], we propose a new scheme that can resist collusion attacks, due to the fact that our scheme and the scheme in [23] have similar communication and computational costs, and we only compare our plan with the scheme in [19,[28][29][30] here.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In VANETs, ensuring the confidentiality, validity, and vehicle identity of messages is crucial, and achieving fast authentication in resource-constrained environments is also essential. Due to the fact that the schemes in [19,23,[28][29][30] basically have the above functions, it is more meaningful to compare the proposed schemes with them in the context of vehicle networking. However, based on the scheme in [23], we propose a new scheme that can resist collusion attacks, due to the fact that our scheme and the scheme in [23] have similar communication and computational costs, and we only compare our plan with the scheme in [19,[28][29][30] here.…”
Section: Performance Analysismentioning
confidence: 99%
“…Message Confidentiality, Message Verifiability, Vehicle Verifiability, Key Escrow Resilience,Quick Verification, and Resist Collusion Attack are all supported by our approach alone, as shown in Table 2 (× represents not having this feature, while the opposite is true for the √ ). The schemes in [28,29] cannot resist collusion attacks and do not provide vehicle verifiability. Although the scheme in [30] can support vehicle verifiability and resist collusion attacks, it cannot ensure the confidentiality of messages because it is an aggregate signature scheme.…”
Section: Functionalitymentioning
confidence: 99%
“…Moreover, how to prevent adaptive election-message attacks is also a problem that needs to be solved. Under adaptive chosen-message attacks, attackers can select the messages they want to attack based on previously received information [24,25]. In an adaptive selective message attack, the attacker can use the signer as an oracle throughout the attack [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…Apart from efficiency in service delivery, security and privacy are other key challenges in most of the cellular network supported IoT communication (Nyangaresi, 2021). For instance, although 5G heterogeneous networks (HetNets) offer high flexibility (Yu & Ren, 2021), these networks are open to attacks. In addition, the diversity of applications and services emanating from the massive devices increases the attack vectors and surfaces for both security and privacy, such as Distributed Denial of Services (DDoS) attacks (Bordel et al, 2021).…”
Section: Introductionmentioning
confidence: 99%
“…Whereas Second Generation to Fourth Generation (2G-4G) employ secret key-based identity authentication, 5G networks introduce asymmetric encryption to protect the International Mobile Subscriber Identification (IMSI) (Chen et al, 2020). However, as explained in Yu and Ren (2021) some of the multi-server approaches are not ideal for 5G networks. In addition, message enciphering using conventional encryption techniques based on private keys requires high memory and computation resources which are detrimental to 5G IoT devices.…”
Section: Introductionmentioning
confidence: 99%