Improvements on Security Proofs of Some Identity Based Encryption Schemes

Author(s):  
Rui Zhang ◽  
Hideki Imai
2019 ◽  
Vol 15 (7) ◽  
pp. 155014771986039 ◽  
Author(s):  
Baokang Zhao ◽  
Puguang Liu ◽  
Xiaofeng Wang ◽  
Ilsun You

Space-air-ground integrated Internet of things can improve the scope of Internet of things applications significantly by offering truly global coverage all over the world. While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. However, the intrinsical properties of network dynamics and wide coverage make the authentication concern in space-air-ground integrated Internet of things extremely challenging than traditional Internet of things networks. In this article, we propose MASIT, an identity-based efficient and lightweight mutual authentication scheme for space-air-ground integrated Internet of things. MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. Experimental results showed that, MASIT outperforms the existing identity-based encryption schemes significantly, that is, the signature verification time can be reduced by 50% to 60%, and the user signature size can be reduced by 13% to 50%.


Author(s):  
Aravind Karrothu ◽  
Jasmine Norman

Fog networking supports the internet of things (IoT) concept, in which most of the devices used by humans on a daily basis will be connected to each other. Security issues in fog architecture are still a major research area as the number of security threats increases every day. Identity-based encryption (IBE) has a wide range of new cryptographic schemes and protocols that are particularly found to be suitable for lightweight architecture such as IoT and wireless sensor networks. This chapter focuses on these schemes and protocols in the background of wireless sensor networks. Also, this chapter analyses identity-based encryption schemes and the various attacks they are prone to.


Author(s):  
Pengqi Cheng ◽  
Yan Gu ◽  
Zihong Lv ◽  
Jianfei Wang ◽  
Wenlei Zhu ◽  
...  

2015 ◽  
Vol 13 (04) ◽  
pp. 1550014 ◽  
Author(s):  
Mark Zhandry

We give the first proof of security for an identity-based encryption (IBE) scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that does not rely on the assumed existence of so-called quantum-secure pseudorandom functions (PRFs). Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical IBE schemes and a random oracle signature scheme, all of which have previously resisted quantum security proofs, even assuming quantum-secure PRFs. We also explain how to remove quantum-secure PRFs from prior quantum random oracle model proofs. We accomplish these results by developing new tools for arguing that quantum algorithms cannot distinguish between two oracle distributions. Using a particular class of oracle distributions that we call semi-constant distributions, we argue that the aforementioned cryptosystems are secure against quantum adversaries.


Sign in / Sign up

Export Citation Format

Share Document