LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Photo by papaioannou_kostas from unsplash

In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the… Click to show full abstract

In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously. However, the security of such schemes is questionable when deployed in modern safety-critical systems, especially as billions of sensitive user information is transmitted over open communication channels. To address this limitation, a lightweight, provably secure certificateless technique that uses Fractional Chaotic Maps (FCM) for group-oriented signcryption (CGST) is presented. The main feature of the CGST-FCM technique is that any group signcrypter may encrypt data/information with the group manager (GM) and have it sent to the verifier. They can verify the legitimacy of the signcrypted information/data using the public conditions of the group, but they cannot link it to the conforming signcrypter. In this scenario, valid signcrypted information/data cannot be produced by the GM or any signcrypter in that category alone. The GM is allowed to reveal the identity of the signcrypter when there is a legal conflict to restrict repudiation of the signature. The CGST-FCM technique is found to be protected from the indistinguishably chosen ciphertext attack (IND-CCA). The computationally difficult problem has been used to build unlinkability, traceability, robust security, and unforgeability. The security investigation of the presented CGST-FCM technique shows commendable consistency and very high efficiency when used in real-time security applications.

Keywords: provably secure; signcryption; group; fractional chaotic; cgst; technique

Journal Title: IEEE Access
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.