A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
暂无分享,去创建一个
Chien-Ming Chen | Saru Kumari | Hizbullah Khattak | Insaf Ullah | Saddam Hussain | Muhammad Asghar Khan | Insaf Ullah | Hizbullah Khattak | S. Kumari | Saddam Hussain | Chien‐Ming Chen
[1] Hizbullah Khattak,et al. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things , 2019, Electronics.
[2] Christof Paar,et al. Elliptic and hyperelliptic curves on embedded μP , 2004, TECS.
[3] Guang Gong,et al. Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields , 2007, IET Inf. Secur..
[4] Hassan M. Elkamchouchi,et al. An Efficient ID-based Proxy Signcryption Scheme without Bilinear Pairings , 2013 .
[5] Michael Huth,et al. New Developments in Cyber Physical Systems, the Internet of Things and the Digital Economy – Discussion on Future Developments in the Industrial Internet of Things and Industry 4.0 , 2019 .
[6] Meng Wang,et al. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.
[7] Huaqun Guo,et al. A Survey on IIoT Security , 2019, 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS).
[8] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[9] Christof Paar,et al. Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems , 2005, IEEE Transactions on Computers.
[10] Zhenfu Cao,et al. Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings , 2005, CIS.
[11] Saru Kumari,et al. A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid , 2020, IEEE Access.
[12] Juergen Jasperneite,et al. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.
[13] An Braeken,et al. PUF Based Authentication Protocol for IoT , 2018, Symmetry.
[14] Ijaz Mansoor Qureshi,et al. An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network , 2020, IEEE Access.
[15] Chien-Ming Chen,et al. Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.
[16] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[17] Xiu-Xia Tian,et al. Secure ID-Based Proxy Signcryption Scheme with Designated Proxy Signcrypter , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[18] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[19] Jian Wu. Identity-Based Proxy Signcryption Schemes , 2013 .
[20] Hizbullah Khattak,et al. A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things , 2020, IEEE Access.
[21] Chunhua Jin,et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.
[22] Jianying Zhou,et al. Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[23] Arun Kumar Sangaiah,et al. Secure CLS and CL-AS schemes designed for VANETs , 2019, The Journal of Supercomputing.
[24] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[25] Sherali Zeadally,et al. Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.
[26] Kim-Kwang Raymond Choo,et al. Design of a provably secure biometrics-based multi-cloud-server authentication scheme , 2017, Future Gener. Comput. Syst..
[27] Hizbullah Khattak,et al. A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications , 2019, Symmetry.
[28] Nistala V. E. S. Murthy,et al. Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks , 2018, Int. J. Commun. Syst..
[29] Muhammad Rashid Naeem,et al. A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve , 2018 .
[30] Lida Xu,et al. Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..
[31] Jianmin Li,et al. Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.
[32] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[33] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[34] Jia-Lun Tsai,et al. A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings , 2014, J. Appl. Math..
[35] Lunzhi Deng,et al. An Identity Based Proxy Signcryption Scheme without Pairings , 2020, Int. J. Netw. Secur..
[36] Junaid Ali Khan,et al. A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach , 2019, Mathematics.
[37] Joe Cunningham,et al. The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..
[38] Mohammad S. Obaidat,et al. An efficient and provable certificate-based proxy signature scheme for IIoT environment , 2020, Inf. Sci..
[39] Hassan M. Elkamchouchi,et al. A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights , 2008, IACR Cryptol. ePrint Arch..
[40] Ijaz Mansoor Qureshi,et al. An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing , 2019, Electronics.
[41] Xiaoyuan Yang,et al. ECGSC: Elliptic Curve Based Generalized Signcryption , 2006, UIC.
[42] Jie Zhang,et al. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain , 2018, Int. J. Distributed Sens. Networks.
[43] Han-Yu Lin,et al. Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..
[44] Caixue Zhou,et al. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings , 2017, Secur. Commun. Networks.
[45] Yue Zhang,et al. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme , 2018, Int. J. Netw. Secur..
[46] Hu Xiong,et al. A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing , 2020, KSII Trans. Internet Inf. Syst..
[47] Prem Prakash Jayaraman,et al. The Role of Big Data Analytics in Industrial Internet of Things , 2019, Future Gener. Comput. Syst..
[48] Tiago M. Fernández-Caramés,et al. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices , 2018, Sensors.
[49] Christof Paar,et al. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves , 2003, CHES.
[50] Ercan Öztemel,et al. Literature review of Industry 4.0 and related technologies , 2018, J. Intell. Manuf..
[51] Wei-Bin Lee,et al. Security enhancement of a novel proxy key generation protocol , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[52] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[53] P. Vasudeva Reddy,et al. An Efficient ID-Based Proxy Signcryption Scheme , 2012 .
[54] Arun Kumar Sangaiah,et al. A certificateless aggregate signature scheme for healthcare wireless sensor network , 2017, Sustain. Comput. Informatics Syst..