Javascript must be enabled to continue!
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
View through CrossRef
Abstract
The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low transmission delay, power consumption, and highsecurity requirement. To the best of our knowledge, a well-designed solution that uses signcryption technology has not been proposed in the IoV research area. Motivated by the fact, a certificateless signcryption scheme based on Elliptic Curve Digital Signature Algorithm, which also considers pseudonym and timestamp mechanism, has been designed in this paper. We prove that our proposed scheme can be reduced to solving the difficulty of the Computational Diffie-Hellman problem under the standard model, show that the scheme meets both security and efficiency requirements, and provides a comparative analysis with the state-of-the-art schemes in terms of security analysis, computational cost, and communication cost, demonstrating that our proposed scheme is suitable to be deployed in the IoV environment.
Title: A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
Description:
Abstract
The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low transmission delay, power consumption, and highsecurity requirement.
To the best of our knowledge, a well-designed solution that uses signcryption technology has not been proposed in the IoV research area.
Motivated by the fact, a certificateless signcryption scheme based on Elliptic Curve Digital Signature Algorithm, which also considers pseudonym and timestamp mechanism, has been designed in this paper.
We prove that our proposed scheme can be reduced to solving the difficulty of the Computational Diffie-Hellman problem under the standard model, show that the scheme meets both security and efficiency requirements, and provides a comparative analysis with the state-of-the-art schemes in terms of security analysis, computational cost, and communication cost, demonstrating that our proposed scheme is suitable to be deployed in the IoV environment.
Related Results
MPKC-based Threshold Proxy Signcryption Scheme
MPKC-based Threshold Proxy Signcryption Scheme
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group sig...
Hybrid lightweight Signcryption scheme for IoT
Hybrid lightweight Signcryption scheme for IoT
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assur...
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing comp...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Cryptanalysis of a Certificateless Partially Blind Signature
Cryptanalysis of a Certificateless Partially Blind Signature
Partially blind signature is an important technique in secure electronic cash system. Recently, Zhang et al. presented the first certificateless partially blind signature scheme an...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
A Lightweight and Secure Certificateless Encryption Scheme for Smart City IoT Security
Abstract
The rapid deployment of Internet of Things (IoT) in smart cities urgently demands lightweight encryption schemes to address critical security vulnerabilities in re...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...

