scispace - formally typeset
Journal ArticleDOI

Heterogeneous Signcryption With Equality Test for IIoT Environment

TLDR
A heterogeneous signcryption scheme with equality test (HSC-ET) that enables a sensor in public key infrastructure to execute data encryption and deliver it to the semitrusted entity (cloud server) and is demonstrated to be secure by the rigorous and detailed analysis.
Abstract
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things (IIoT). To deal with this challenge, we propose a heterogeneous signcryption scheme with equality test (HSC-ET) in this article. This scheme enables a sensor in public key infrastructure (PKI) to execute data encryption and deliver it to the semitrusted entity (cloud server). When a user in an identity-based cryptosystem (IBC) intends to search for some data stored on the cloud server. The delegated cloud server executes tests on ciphertexts for determining whether the same underlying plaintext exists between two ciphertexts. These two ciphertexts can be one signcrypted ciphertext and one encrypted ciphertext, or both encrypted/signcrypted ciphertext, thus achieving a flexible search to the ciphertext. HSC-ET is demonstrated to be secure by the rigorous and detailed analysis. The experimental simulation and analysis results show the efficiency of our scheme.

read more

Citations
More filters
Journal ArticleDOI

A secure blockchain-based group key agreement protocol for IoT

TL;DR: This paper proposes a blockchain-based authenticated group key agreement protocol for IoT, which introduces a new entity called the device manager, who acts as an intermediary to connect IoT devices with blockchain networks.
Journal ArticleDOI

A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

TL;DR: Li et al. as discussed by the authors proposed a Shamir threshold cryptography scheme for IIoT data protection using blockchain, where the edge gateway uses a symmetric key to encrypt the data uploaded by the IoT device and stores it in the cloud.
Journal ArticleDOI

An enhanced pairing-based authentication scheme for smart grid communications

TL;DR: This study finds that the PAuth scheme proposed by Chen et al. still suffers from some security defects, and an enhanced scheme based on PAuth is proposed, and ProVerif, an automatic cryptographic protocol verifier, is used to analyze the enhanced scheme.
Journal ArticleDOI

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

TL;DR: Wang et al. as mentioned in this paper proposed a multiserver authentication scheme based on biometrics and proved the security of their scheme against session-specific temporary information attacks, user impersonation attacks, and server impersonation attack.
Journal ArticleDOI

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

TL;DR: A new authentication key exchange (AKE) scheme that uses fog nodes as relay nodes has been designed and completes mutual authentication and generates a session key for later confidential communication in fog-based VANETs.
References
More filters
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Internet of Things in Industries: A Survey

TL;DR: This review paper summarizes the current state-of-the-art IoT in industries systematically and identifies research trends and challenges.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Proceedings ArticleDOI

An overview of the OMNeT++ simulation environment

TL;DR: An overview of the OMNeT++ framework, recent challenges brought about by the growing amount and complexity of third party simulation models, and the solutions the authors introduce in the next major revision of the simulation framework are presented.
Book ChapterDOI

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Related Papers (5)