• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于符合型 Chebyshev 混沌映射的面向以人为中心的物联网环境的 PKC 的可证明安全 IBE 转换模型。

A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.

机构信息

Department of Post Graduate Studies and Research in Mathematics, Jaywanti Haksar Govt. Post-Graduation College, College of Chhindwara University, Betul 460001, India.

Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria.

出版信息

Sensors (Basel). 2021 Oct 30;21(21):7227. doi: 10.3390/s21217227.

DOI:10.3390/s21217227
PMID:34770535
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8587915/
Abstract

The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.

摘要

公钥密码学 (PKC) 在保障以人为中心的物联网环境下无线网络的安全性方面的地位怎么强调都不为过。PKC 利用了配对密钥的思想,这些密钥在数学上是相关的,但在实践中是独立的。在 PKC 中,每个通信方都需要对方的公钥和授权数字证书才能实现加密和解密。在这种情况下,需要一个目录来存储参与方的公钥。然而,这样的目录设计可能成本高昂且耗时。最近,引入了基于身份的加密 (IBE) 方案来解决 PKC 方案的巨大局限性。在典型的 IBE 系统中,第三方服务器可以向系统中的所有参与方分发公共凭证。因此,可以从任意公钥中提取私钥。结果,发送方可以使用接收方的公钥对消息进行加密,而接收方可以使用提取的私钥对消息进行解密。为了提高系统安全性,人们仅希望采用新的 IBE 方案。然而,设计全新的 IBE 技术的复杂性和成本仍然存在。为了解决这个问题,本文提出了一种在以人为中心的物联网环境下使用一致的 Chebyshev 混沌映射的基于 PKC 的可证明安全的 IBE 转换模型。具体来说,我们提供了一种强大而安全的 IBE 转换模型,并对模型进行了广泛的性能分析和安全证明。最后,我们展示了所提出的 IBE 转换模型相对于现有 IBE 方案的优越性。总的来说,结果表明,与初步的基于 IBE 的方案相比,所提出的方案具有出色的安全性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/fc4a42e90a48/sensors-21-07227-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/6cfceae8b27a/sensors-21-07227-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/985bd3ae8674/sensors-21-07227-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/af5f200302ea/sensors-21-07227-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/6556b1411b34/sensors-21-07227-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/fc4a42e90a48/sensors-21-07227-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/6cfceae8b27a/sensors-21-07227-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/985bd3ae8674/sensors-21-07227-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/af5f200302ea/sensors-21-07227-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/6556b1411b34/sensors-21-07227-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/00e2/8587915/fc4a42e90a48/sensors-21-07227-g005.jpg

相似文献

1
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.基于符合型 Chebyshev 混沌映射的面向以人为中心的物联网环境的 PKC 的可证明安全 IBE 转换模型。
Sensors (Basel). 2021 Oct 30;21(21):7227. doi: 10.3390/s21217227.
2
Backward Compatible Identity-Based Encryption.后向兼容基于身份的加密。
Sensors (Basel). 2023 Apr 22;23(9):4181. doi: 10.3390/s23094181.
3
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.基于使用一致混沌映射的无证书群签密方案的高效电子现金系统。
Sensors (Basel). 2021 Oct 23;21(21):7039. doi: 10.3390/s21217039.
4
Fractional chaotic maps based short signature scheme under human-centered IoT environments.基于分数阶混沌映射的以人为中心的物联网环境下的短签名方案。
J Adv Res. 2020 Sep 9;32:139-148. doi: 10.1016/j.jare.2020.08.015. eCollection 2021 Sep.
5
Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.基于云的智能产业中的网络物理安全的混合技术。
Sensors (Basel). 2022 Jun 19;22(12):4630. doi: 10.3390/s22124630.
6
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.基于物联网的医疗保健系统中具有可证明安全性的高效用户认证和用户匿名方案。
Sensors (Basel). 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482.
7
A generic construction for revocable identity-based encryption with subset difference methods.基于子集差方法的可撤销身份加密的通用构造。
PLoS One. 2020 Sep 18;15(9):e0239053. doi: 10.1371/journal.pone.0239053. eCollection 2020.
8
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.一种高效且可证明安全的基于证书的物联网 (IoT) 中移动健康 (M-Health) 系统的组合签名、加密和签密方案。
J Med Syst. 2020 Nov 27;45(1):4. doi: 10.1007/s10916-020-01658-8.
9
Compressive sensing based secure data aggregation scheme for IoT based WSN applications.基于压缩感知的物联网无线传感器网络应用中安全数据聚合方案。
PLoS One. 2021 Dec 16;16(12):e0260634. doi: 10.1371/journal.pone.0260634. eCollection 2021.
10
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.可证明安全的无线体域网异构访问控制方案
J Med Syst. 2018 Apr 28;42(6):108. doi: 10.1007/s10916-018-0964-z.

本文引用的文献

1
Fractional chaotic maps based short signature scheme under human-centered IoT environments.基于分数阶混沌映射的以人为中心的物联网环境下的短签名方案。
J Adv Res. 2020 Sep 9;32:139-148. doi: 10.1016/j.jare.2020.08.015. eCollection 2021 Sep.
2
A New Algorithm for Digital Image Encryption Based on Chaos Theory.一种基于混沌理论的数字图像加密新算法。
Entropy (Basel). 2021 Mar 13;23(3):341. doi: 10.3390/e23030341.
3
6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap.面向可持续社会的6G智能基础设施:机遇、挑战与研究路线图。
Sensors (Basel). 2021 Mar 2;21(5):1709. doi: 10.3390/s21051709.
4
Secure anonymous mutual authentication for star two-tier wireless body area networks.面向星型双层无线体域网的安全匿名相互认证
Comput Methods Programs Biomed. 2016 Oct;135:37-50. doi: 10.1016/j.cmpb.2016.07.022. Epub 2016 Jul 15.