A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

Author(s):  
Chi Yuan ◽  
Wenping Chen ◽  
Deying Li
2020 ◽  
Vol 309 ◽  
pp. 02006
Author(s):  
Jianbo Yao ◽  
Chaoqiong Yang

It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key cryptography is proposed. The security architecture is based on identity based cryptosystem, but not requires key handshaking. The analysis shows that the security architecture ensures a good level of security and is very much suitable for the resources constrained trend of wireless sensor network.


2010 ◽  
Vol 9 (4) ◽  
pp. 287-296 ◽  
Author(s):  
Joseph K. Liu ◽  
Joonsang Baek ◽  
Jianying Zhou ◽  
Yanjiang Yang ◽  
Jun Wen Wong

2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Chunpeng Ge ◽  
Jinyue Xia ◽  
Aaron Wu ◽  
Hongwei Li ◽  
Yao Wang

Wireless sensor network (WSN), which extends the typical Internet environment to Internet of Things, has been deployed in various environments such as safety monitoring, intelligent transportation, and smart home. In a WSN, encryption is typically used to protect data that are stored in wireless devices. However some features like data sharing can be affected if the traditional encryption is used. A secure mechanism should support a gateway of the network to directly convert a user’s encrypted data (encrypted pollution data) to a new user’s encryption without exposing the underlying plaintext data during the whole sharing phase. In this work, a new source hiding identity-based proxy reencryption scheme (SHIB-PRE) is proposed to deal with the issue. The proposed SHIB-PRE scheme supports a proxy (gateway or cloud server) to transform a user’s encrypted date to a new user’s ciphertext as long as the proxy has the proxy reencryption key. In SHIB-PRE, the encrypted pollution data is kept secure from the proxy and the relationship between a source ciphertext and a reencrypted ciphertext is concealed from the outside eavesdropper. In this paper, we give an introduction to the definition of a source hiding identity-based proxy reencryption and its chosen plaintext security model. Further, a concrete construction will be presented and proven chosen plaintext secure under the q-DDHE assumption in the standard model.


Sign in / Sign up

Export Citation Format

Share Document