Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A New Certificateless Signcryption Scheme for Securing Internet of Vehicles

View through CrossRef
Abstract The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low transmission delay, power consumption, and highsecurity requirement. To the best of our knowledge, a well-designed solution that uses signcryption technology has not been proposed in the IoV research area. Motivated by the fact, a certificateless signcryption scheme based on Elliptic Curve Digital Signature Algorithm, which also considers pseudonym and timestamp mechanism, has been designed in this paper. We prove that our proposed scheme can be reduced to solving the difficulty of the Computational Diffie-Hellman problem under the standard model, show that the scheme meets both security and efficiency requirements, and provides a comparative analysis with the state-of-the-art schemes in terms of security analysis, computational cost, and communication cost, demonstrating that our proposed scheme is suitable to be deployed in the IoV environment.
Research Square Platform LLC
Title: A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
Description:
Abstract The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low transmission delay, power consumption, and highsecurity requirement.
To the best of our knowledge, a well-designed solution that uses signcryption technology has not been proposed in the IoV research area.
Motivated by the fact, a certificateless signcryption scheme based on Elliptic Curve Digital Signature Algorithm, which also considers pseudonym and timestamp mechanism, has been designed in this paper.
We prove that our proposed scheme can be reduced to solving the difficulty of the Computational Diffie-Hellman problem under the standard model, show that the scheme meets both security and efficiency requirements, and provides a comparative analysis with the state-of-the-art schemes in terms of security analysis, computational cost, and communication cost, demonstrating that our proposed scheme is suitable to be deployed in the IoV environment.

Related Results

MPKC-based Threshold Proxy Signcryption Scheme
MPKC-based Threshold Proxy Signcryption Scheme
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group sig...
Hybrid lightweight Signcryption scheme for IoT
Hybrid lightweight Signcryption scheme for IoT
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assur...
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing comp...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Cryptanalysis of a Certificateless Partially Blind Signature
Cryptanalysis of a Certificateless Partially Blind Signature
Partially blind signature is an important technique in secure electronic cash system. Recently, Zhang et al. presented the first certificateless partially blind signature scheme an...
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
Abstract The rapid deployment of Internet of Things (IoT) in smart cities urgently demands lightweight encryption schemes to address critical security vulnerabilities in re...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...

Back to Top