2019
DOI: 10.3390/s19122692
|View full text |Cite
|
Sign up to set email alerts
|

A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments

Abstract: With the widespread application of the Internet of Things (IoT), ensuring communication security for IoT devices is of considerable importance. Since IoT data are vulnerable to eavesdropping, tampering, forgery, and other attacks during an open network transmission, the integrity and authenticity of data are fundamental security requirements in the IoT. A certificateless signature (CLS) is a viable solution for providing data integrity, data authenticity, and identity identification in resource-constrained IoT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 47 publications
0
11
0
Order By: Relevance
“…To address the key management issue against malicious key generation center in public key cryptosystems, many certificateless signature schemes have been proposed 10,11 and proved unforgeable under adaptively chosen message attacks. Due to the key escrow problem, Mwitende et al 12 proposed a pairing-based certificateless authentication scheme.…”
Section: Related Workmentioning
confidence: 99%
“…To address the key management issue against malicious key generation center in public key cryptosystems, many certificateless signature schemes have been proposed 10,11 and proved unforgeable under adaptively chosen message attacks. Due to the key escrow problem, Mwitende et al 12 proposed a pairing-based certificateless authentication scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, none of the solutions work effectively by providing a valid solution to the signature generation and verification.In digital signature, the private key of a particular signer is used to sign the content/message, while the public key is used for the authenticity of the signer [25]. However, it is a costly operation for every router, to verify the authenticity of each content with a Public Key Infrastructure (PKI) setting [26]. Therefore, IoT-based NDN network demands a lightweight signature scheme that can be used to solve the certificates management issues with minimal computation and communication costs.…”
Section: Introductionmentioning
confidence: 99%
“…Data security and privacy preservation are major challenges in the applications of the IoT. Integrity, non-repudiation and authenticity have become the key security requirements for the Internet of Things [4].…”
Section: Introductionmentioning
confidence: 99%
“…In IoT applications, identity authentication, encryption, and integrity verification can be achieved by secure hash functions and digital signature algorithms which can ensure data privacy and rooting security [2]. Many scholars have been working on this issue [4,5,6]. Yeh et al [5] proposed a certificateless signature scheme based on elliptic curve cryptography (ECC).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation