Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source: Ad Hoc Networks, Vol. 71, pp , 2018

Similar presentations


Presentation on theme: "Source: Ad Hoc Networks, Vol. 71, pp , 2018"— Presentation transcript:

1 An Efficient Provably-secure Certificateless Signature Scheme for Internet-of-Things Deployment
Source: Ad Hoc Networks, Vol. 71, pp , 2018 Authors: Xiaoying Jia, Debiao He, Qin Liu and Kim- Kwang Raymond Choo Speaker:Hsiao-Ling Wu Date:2018/01/18

2 Outline Introduction Proposed scheme Comparisons Conclusions
CL-PKC, Security model Proposed scheme Comparisons Conclusions

3 Introduction(1/1) Certificateless public key cryptography (CL-PKC)
S.S. Al-Riyami and K.G. Paterson, “Certificateless public key cryptography,” Advances in Cryptology - ASIACRYPT 2003, Springer, 2003, pp. 452–473. D. He, J. Chen, and R. Zhang, “An efficient and provably secure certificateless signature scheme without bilinear pairings,” Int. J. Commun. Syst. 25 (11) (2011) 1432–1442. K.H. Yeh, C. Su, K.-K.R. Choo, and W. Chiu, “A novel certificateless signature scheme for smart objects in the internet-of-things,” Sensors 17 (5) (2017)

4 Introduction(1/1) Security model Type I - Key Replacement Attack.
A third party tries to impersonate a user after compromising the user secret key and/or replacing the user public key with some value chosen by the third party. However, it does not know the user partial key. Type II - Malicious KGC Attack. The KGC, who knows the partial key of a user, is malicious and tries to impersonate the user. However, the KGC does not know the user secret key or being able to replace the user public key.

5 Proposed scheme(1/6) This scheme consists of seven algorithms: Setup Partial-Private-Key-Extraction Set-Secret-Value Set-Private-Key Set-Public-Key Sign Verify

6 Proposed scheme(2/6) Setup Key generator centre (KGC)

7 Proposed scheme(3/6) Partial-Private-Key-Extraction
Key generator centre (KGC) Signer

8 Proposed scheme(4/6) Set-Secret-Value Set-Private-Key Set-Public-Key
Signer Set-Private-Key Set-Public-Key

9 Proposed scheme(5/6) Sign Signer

10 Proposed scheme(6/6) Verify Verifier

11 Comparisons [31] K.H. Yeh , C. Su , K.-K.R. Choo , W. Chiu , A novel certificateless signature scheme for smart objects in the internet-of-things, Sensors 17 (5) (2017)

12 Conclusions A certificateless signature scheme without bilinear pairings Random oracle

13 Appendix(1/1) Certificateless public key cryptography (CL-PKC)
Key generator center (KGC) Verifier Signer


Download ppt "Source: Ad Hoc Networks, Vol. 71, pp , 2018"

Similar presentations


Ads by Google