Javascript must be enabled to continue!
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
View through CrossRef
Abstract
The rapid deployment of Internet of Things (IoT) in smart cities urgently demands lightweight encryption schemes to address critical security vulnerabilities in resource-constrained environments. Traditional certificateless encryption schemes suffer from public key replacement attacks and risks of partial key leakage caused by compromised private key generators. To overcome these challenges, this paper proposes a lightweight and secure certificateless encryption scheme. The proposed scheme integrates a Schnorr signature mechanism incorporating user identifiers, secret values, and public keys. Under the standard model, the scheme demonstrates resistance against adaptive chosen ciphertext attacks (CCA2) from both Type I adversaries (capable of replacing public keys) and Type II adversaries (possessing the system master key). Performance evaluation results indicate that the scheme maintains high security while achieving efficient encryption performance and reliable public key verification, making it particularly suitable for secure communication in IoT devices within smart city applications.
Title: A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
Description:
Abstract
The rapid deployment of Internet of Things (IoT) in smart cities urgently demands lightweight encryption schemes to address critical security vulnerabilities in resource-constrained environments.
Traditional certificateless encryption schemes suffer from public key replacement attacks and risks of partial key leakage caused by compromised private key generators.
To overcome these challenges, this paper proposes a lightweight and secure certificateless encryption scheme.
The proposed scheme integrates a Schnorr signature mechanism incorporating user identifiers, secret values, and public keys.
Under the standard model, the scheme demonstrates resistance against adaptive chosen ciphertext attacks (CCA2) from both Type I adversaries (capable of replacing public keys) and Type II adversaries (possessing the system master key).
Performance evaluation results indicate that the scheme maintains high security while achieving efficient encryption performance and reliable public key verification, making it particularly suitable for secure communication in IoT devices within smart city applications.
Related Results
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has ...
Research on Communication Network Security Based on Narrowband Internet of Things and Encryption Algorithms
Research on Communication Network Security Based on Narrowband Internet of Things and Encryption Algorithms
With the rapid development of Internet of Things (IoT) technology, Narrowband IoT (NB-IoT) has been widely adopted in smart cities, smart homes, and industrial automation due to it...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services
Smart cities use advanced infrastructure and technology to improve the quality of life for their citizens. Collaborative services in smart cities are making the smart city ecosyste...
Kajian Pembangunan Smart Society Kota Bandung
Kajian Pembangunan Smart Society Kota Bandung
Abstract. Rancasari sub-district which is included in the Gedebage SWK with the theme of the technopolis area has a strong position in smart development because of the interest of ...
Cryptanalysis of a Certificateless Partially Blind Signature
Cryptanalysis of a Certificateless Partially Blind Signature
Partially blind signature is an important technique in secure electronic cash system. Recently, Zhang et al. presented the first certificateless partially blind signature scheme an...

