LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Certificateless Proxy Signcryption in the Standard Model for a UAV Network

Photo by scottwebb from unsplash

As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key cryptography scheme,… Click to show full abstract

As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key cryptography scheme, which was proved to be secure in ROM may be insecure when instantiating random oracles with concrete hash functions in practical applications. So far as we know, certificateless proxy signcryption (CLPSC) scheme’s security is only proved by applying ROM. Therefore, it is quite important to construct a CLPSC scheme in the standard model (SM). In this article, we propose the first CLPSC scheme in SM, which can achieve public verifiability and we prove that this scheme is EUF-CMA-CLPSC security and IND-CCA-CLPSC security against type I adversary $\mathcal {A}_{I}$ and Type II adversary $\mathcal {A}_{II}$ . Additionally, we compare our scheme’s performance with several previous schemes’ performance in terms of calculation, communication, and security. The results show that our CLPSC scheme has better security performance, which is suitable for a unmanned aerial vehicle network.

Keywords: proxy signcryption; certificateless proxy; security; clpsc scheme; model; standard model

Journal Title: IEEE Internet of Things Journal
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.