Skip to main content
Erschienen in: Wireless Personal Communications 2/2015

01.09.2015

Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks

verfasst von: Gaurav Sharma, Suman Bala, Anil K. Verma

Erschienen in: Wireless Personal Communications | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Signcryption is a novel cryptographic primitive, which enables a user to perform digital signature (providing authenticity) and public key encryption (providing message confidentiality) simultaneously in a single logical step with a cost lesser than sign-then-encrypt approach. Without revealing the identity of the user (maintaining anonymity), ring signcryption can provide confidentiality and authenticity both. In this paper, a Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks has been proposed. In addition, existing certificateless ring signcryption schemes have been analyzed based on various parameters. A comparison illustrating the computational cost has been prepared, which can be helpful in deciding the efficiency and security of the algorithm. Also, the proposed approach has been evaluated for Wireless Sensor Networks (WSN). The experimental evaluation of the PF-CLRSC algorithm on MICAz sensor mote, using TinyOS and RELIC-Toolkit cryptographic library proved the feasibility of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef
2.
Zurück zum Zitat Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2007). Security in distributed, grid, and pervasive computing, chapter 17 wireless sensor network security: A survey, pp. 1–51. CRC Press. Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2007). Security in distributed, grid, and pervasive computing, chapter 17 wireless sensor network security: A survey, pp. 1–51. CRC Press.
3.
Zurück zum Zitat Olariu, S., & Xu, Q. (2005). Information assurance in wireless sensor networks. In Proceedings of the IEEE international symposium on parallel and distributed processing, volume 13, p. 236a. Los Alamitos, CA, USA: IEEE Computer Society. Olariu, S., & Xu, Q. (2005). Information assurance in wireless sensor networks. In Proceedings of the IEEE international symposium on parallel and distributed processing, volume 13, p. 236a. Los Alamitos, CA, USA: IEEE Computer Society.
4.
Zurück zum Zitat Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology volume 196 of Lecture notes in computer science, pp. 47–53. Berlin, Heidelberg: Springer. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology volume 196 of Lecture notes in computer science, pp. 47–53. Berlin, Heidelberg: Springer.
5.
Zurück zum Zitat Al-Riyami, S., & Paterson, K. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 volume 2894 of Lecture notes in computer science, pp. 452–473. Berlin, Heidelberg: Springer. Al-Riyami, S., & Paterson, K. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 volume 2894 of Lecture notes in computer science, pp. 452–473. Berlin, Heidelberg: Springer.
6.
Zurück zum Zitat Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Proceedings of the 19th international conference on advanced information networking and applications, volume 2 of AINA ’05. 2, pp. 649–654. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Proceedings of the 19th international conference on advanced information networking and applications, volume 2 of AINA ’05. 2, pp. 649–654.
7.
Zurück zum Zitat Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \({\ll }\) cost (signature) \(+\) cost (encryption). In Advances in cryptologyCRYPTO ’97, volume 1294 of Lecture notes in computer science, pp.165–179. Berlin, Heidelberg: Springer. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \({\ll }\) cost (signature) \(+\) cost (encryption). In Advances in cryptologyCRYPTO ’97, volume 1294 of Lecture notes in computer science, pp.165–179. Berlin, Heidelberg: Springer.
8.
Zurück zum Zitat Miller, V. (1986). Use of elliptic curves in cryptography. In Advances in cryptology CRYPTO 85 proceedings volume 218 of Lecture notes in computer science, pp. 417–426. Berlin, Heidelberg: Springer. Miller, V. (1986). Use of elliptic curves in cryptography. In Advances in cryptology CRYPTO 85 proceedings volume 218 of Lecture notes in computer science, pp. 417–426. Berlin, Heidelberg: Springer.
9.
Zurück zum Zitat Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the 3rd IEEE international conference on pervasive computing and communications, PERCOM ’05, pp. 324–328. Washington, DC, USA: IEEE Computer Society. Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the 3rd IEEE international conference on pervasive computing and communications, PERCOM ’05, pp. 324–328. Washington, DC, USA: IEEE Computer Society.
10.
Zurück zum Zitat Rivest, R., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In Advances in cryptology ASIACRYPT 2001 volume 2248 of Lecture notes in computer science, pp. 552–565. Berlin, Heidelberg: Springer. Rivest, R., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In Advances in cryptology ASIACRYPT 2001 volume 2248 of Lecture notes in computer science, pp. 552–565. Berlin, Heidelberg: Springer.
11.
Zurück zum Zitat Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In Cryptology and network security volume 3810 of Lecture notes in computer science, pp. 13–25. Berlin, Heidelberg: Springer. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In Cryptology and network security volume 3810 of Lecture notes in computer science, pp. 13–25. Berlin, Heidelberg: Springer.
12.
Zurück zum Zitat Sharma, G., Bala, S., & Verma, A. (2013). An identity-based ring signcryption scheme - Evaluation for wireless sensor networks. IEEK Transactions on Smart Processing & Computing, 2(2), 57–66. Sharma, G., Bala, S., & Verma, A. (2013). An identity-based ring signcryption scheme - Evaluation for wireless sensor networks. IEEK Transactions on Smart Processing & Computing, 2(2), 57–66.
13.
Zurück zum Zitat Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC ’07, pp. 107–111. Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC ’07, pp. 107–111.
14.
Zurück zum Zitat Lijun, Z., Futai, Z., & Songqin, M. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES ’10, pp. 423–427. Lijun, Z., Futai, Z., & Songqin, M. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES ’10, pp. 423–427.
15.
Zurück zum Zitat Zhenghua, Q., Geng, G., & Xunyi, R. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106. Zhenghua, Q., Geng, G., & Xunyi, R. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106.
16.
Zurück zum Zitat Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.MATHCrossRef Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.MATHCrossRef
18.
Zurück zum Zitat Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., & Culler, D. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence, pp. 115–148. Berlin, Heidelberg: Springer. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., & Culler, D. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence, pp. 115–148. Berlin, Heidelberg: Springer.
Metadaten
Titel
Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks
verfasst von
Gaurav Sharma
Suman Bala
Anil K. Verma
Publikationsdatum
01.09.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2698-2

Weitere Artikel der Ausgabe 2/2015

Wireless Personal Communications 2/2015 Zur Ausgabe

Neuer Inhalt