Javascript must be enabled to continue!
Hybrid lightweight Signcryption scheme for IoT
View through CrossRef
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and then encrypt it. Signcryption is a technique where the signature and the encryption are performed in a single round. The current Signcryption system uses traditional cryptographic approaches that are overloaded for IoT, as it consists of resource-constrained devices and uses the weak session key to encrypt the data. We propose a hybrid Signcryption scheme that employs PRESENT, a lightweight block cipher algorithm to encrypt the data, and the session key is encrypted by ECC. The time taken to signcrypt the proposed Signcryption is better when compared to current Signcryption techniques, as it deploys lightweight cryptography techniques that are devoted to resource-constrained devices.
Title: Hybrid lightweight Signcryption scheme for IoT
Description:
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely.
The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and then encrypt it.
Signcryption is a technique where the signature and the encryption are performed in a single round.
The current Signcryption system uses traditional cryptographic approaches that are overloaded for IoT, as it consists of resource-constrained devices and uses the weak session key to encrypt the data.
We propose a hybrid Signcryption scheme that employs PRESENT, a lightweight block cipher algorithm to encrypt the data, and the session key is encrypted by ECC.
The time taken to signcrypt the proposed Signcryption is better when compared to current Signcryption techniques, as it deploys lightweight cryptography techniques that are devoted to resource-constrained devices.
Related Results
MPKC-based Threshold Proxy Signcryption Scheme
MPKC-based Threshold Proxy Signcryption Scheme
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group sig...
Identity Based Generalized Signcryption Scheme in the Standard Model
Identity Based Generalized Signcryption Scheme in the Standard Model
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage...
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing comp...
Applications of Ontology in the Internet of Things: A Systematic Analysis
Applications of Ontology in the Internet of Things: A Systematic Analysis
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and obj...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
In the era of globalization, Internet of Things (IoT) technology has changed the way information is disseminated and accessed, including in the context of spreading Islam. This stu...
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
Abstract
The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low tran...
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature func...

