A Novel Framework in Cloud Security: Remote Signcryption DOI
Mohammad Ali, Ximeng Liu

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(24), P. 41207 - 41222

Published: Sept. 11, 2024

Language: Английский

Efficient Threshold Attribute-Based Signature Scheme for Unmanned Aerial Vehicle (UAV) Networks DOI Open Access
Lei He, Yong Gan, Yifeng Yin

et al.

Electronics, Journal Year: 2025, Volume and Issue: 14(2), P. 339 - 339

Published: Jan. 16, 2025

Unmanned aerial vehicles (UAVs) are highly versatile and cost-effective, making them an attractive option for various applications. In UAV networks, it is essential to implement a digital signature scheme ensure the integrity authentication of commands sent UAVs. Moreover, this not only maintains real-time performance UAVs while executing but also protects identity privacy signer. To meet these needs, we propose efficient threshold attribute-based proxy (t-ABPS) that integrates predicate specifically designed networks. The formal security proof t-ABPS demonstrates its existential unforgeability under selective-attribute chosen-message attacks (EUF-sA-CMA) in random oracle model. This ensures Furthermore, evaluate computational costs communication associated with proposed scheme. Our analysis indicates more computationally than other existing schemes, has higher costs.

Language: Английский

Citations

0

IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication DOI
Ikram Ali, Jianqiang Li, Jie Chen

et al.

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(18), P. 29941 - 29955

Published: June 3, 2024

With recent progress in Internet of Things technology, it is becoming more and commonplace to use unmanned aerial vehicles (UAVs) for inconsiderable purposes. On the other hand, traditional all these UAV networks adopt a susceptible open wireless communication, rendering systems vulnerable attacks like eavesdropping, tampering, interrupting, forging. The most effective way address security challenges through signcryption. However, current signcryption methods are computationally bandwidth-intensive, making them unsuitable UAVs with limited resources ground stations (GS) handling high volume messages. To challenges, we propose solution employing an identity-based online/offline scheme secure communication from GS, known as IOOSC-U2G. This leverages elliptic curve cryptography without need time-intensive operations bilinear pairing. During online phase, absence point multiplication operations, already executed offline significantly alleviates computational burdens. optimization reduces overhead throughout entire process Moreover, IOOSC-U2G ensures privacy identities during GS. Additionally, proposed empowers GS verify multiple inputs at once batch verification method. We demonstrate that within random oracle model, guarantees security, specifically confidentiality unforgeability, relying on hardness assumptions inverse Computational Diffie-Hellman problem Discrete Logarithm problem, respectively. our outperforms methods, particularly efficiency.

Language: Английский

Citations

2

Medical image security and authenticity via dual encryption DOI
Kishore Babu Nampalle,

Shriansh Manhas,

Balasubramanian Raman

et al.

Applied Intelligence, Journal Year: 2023, Volume and Issue: 53(17), P. 20647 - 20659

Published: April 19, 2023

Language: Английский

Citations

5

Identity-based signcryption scheme for medical cyber physical system in standard model DOI
Rachana Patil, Yogesh H. Patil

International Journal of Information Technology, Journal Year: 2022, Volume and Issue: 14(5), P. 2275 - 2283

Published: June 4, 2022

Language: Английский

Citations

8

A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G DOI Creative Commons
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah

et al.

Drones, Journal Year: 2023, Volume and Issue: 7(5), P. 321 - 321

Published: May 16, 2023

Security and privacy issues were long a subject of concern with drones from the past few years. This is due to lack security considerations in design drone, which includes unsecured wireless channels insufficient computing capability perform complex cryptographic algorithms. Owing extensive real-time applications ubiquitous connection beyond 5G (B5G) networks, efficient measures are required prevent unauthorized access sensitive data. In this article, we proposed resource-friendly proxy signcryption scheme certificateless settings. The was based on elliptic curve cryptography (ECC), has reduced key size, i.e., 80 bits, is, therefore, suitable for drones. Using random oracle model (ROM), analysis performed shown be secure against well-known attacks. performance also compared relevant existing schemes terms computation communication costs. findings validate practicability scheme.

Language: Английский

Citations

2

Attribute-Based Proxy Signature Scheme Supporting Flexible Threshold Predicate for UAV Networks DOI Open Access
Lei He, Yong Gan, Yanhua Zhang

et al.

Electronics, Journal Year: 2023, Volume and Issue: 12(23), P. 4854 - 4854

Published: Nov. 30, 2023

Unmanned aerial vehicle (UAV) is an attractive application because of its flexibility and economy. It may use a digital signature scheme to protect commands sent UAVs. Moreover, the should guarantee real-time performance UAVs executing signer’s privacy. Therefore, we proposed attribute-based proxy (ABPS) supporting flexible threshold predicate for UAV networks proved security. has existential unforgeability under selective-predicate chosen message attacks (EUF-sP-CMA) can We analyzed computation costs based on experimental data communication costs. The analysis results indicate that our ABPS less than other schemes at same level as

Language: Английский

Citations

1

An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks DOI Creative Commons
Negalign Wake Hundera,

Wang Shumeng,

Dagmawit Mesfin

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(5), P. 102044 - 102044

Published: May 4, 2024

The rapid growth of the Internet Things (IoT) has led to an increased deployment unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among primary challenges in UAV networks. In addition, significant communication delays can occur when UAVs perform remote tasks far from a command center (CC); some cases, they may be unable communicate with CC. To address these challenges, this paper, efficient online/offline heterogeneous proxy signcryption scheme for secure networks (HOOPSC) is proposed. This enables CC certificateless cryptosystem (CLC) environment delegate nearby ground control station (GCS) act as agent, directly send commands within identity-based (IBC) undertakes then decrypts verifies authenticity confidentiality. proposed scheme, process split into offline online phases, most heavy computations conducted without availability messages during phase. Only light performed phase message available. Moreover, formal proof given random oracle model. Finally, performance analysis reveals that HOOPSC outperforms existing relevant schemes, making it ideal long-range operations

Language: Английский

Citations

0

A Novel Framework in Cloud Security: Remote Signcryption DOI
Mohammad Ali, Ximeng Liu

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(24), P. 41207 - 41222

Published: Sept. 11, 2024

Language: Английский

Citations

0