Abstract
Signcryption is a highly efficient approach to simultaneously achieving message confidentiality and authentication in Human-Centered IoT (HC-IoT) systems. HCIoT is a new field of study that links various aspects of life such as smart cards, business, e-commerce, healthcare, and sensitive private data. A number of intelligent systems favor human intervention to start automated tasks. A number of smart devices have a social effect in that they should be capable of changing their functional model based on the behavior of different humans. It has boosted the development of information exchange over the IoT and enabled networks. It encompasses cellular, vehicular, and human healthcare by utilizing middleware. Currently, group signcryption schemes are gaining widespread popularity in HC-IoT environments. HC-IoT is useful in electronic cash systems, lightweight devices, multi-server networks, and more. However, most signcryption schemes use bilinear pairing that is computationally intensive, and there is a need for more efficient signcryption schemes. In order to solve this issue, this paper introduces an efficient Certificateless Group-oriented Signcryption (CGS) scheme using Quantum Chebyshev Chaotic Maps (QCCM) without employing bilinear pairing. The proposed QCCM-CGS scheme’s standout feature is that any group signcrypter can signcrypt a text/information with the group manager (GM) and then present it to the verifier for verification. By using the public conditions of the group, the verifier approves the validity of the signcrypted text and cannot connect the signcrypted text to the conforming signcrypter. However, a legitimate signcrypted text cannot be generated even by the GM or any signcrypter of that group unaccompanied. In situations where there is a legal disagreement, such as non-repudiation of the signature, the GM can reveal the identity of the signcrypter. The presented scheme is adequately secured from the indistinguishably chosen ciphertext attack. The computationally challenging problem, QCCM, is used as the foundation for the construction of traceability, unforgeability, unlinkability, and security. Lastly, the security review of the projected scheme clearly shows significant consistency, and it can be easily deployed in vulnerable security applications.
Similar content being viewed by others
References
Imoize AL, Adedeji O, Tandiya N, Shetty S (2021) 6G enabled smart infrastructure for sustainable society: opportunities, challenges, and research roadmap. Sensors 21(5):1–58. https://doi.org/10.3390/s21051709
Singh J, Gimekar A, Venkatesan S (2019) An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int J Commun Syst. https://doi.org/10.1002/dac.4189
Meshram C, Obaidat MS, Hsiao KF, Imoize AL, Meshram A (2021) An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee. In: 2021 Int Conf Commun. Comput. Cybersecurity, Informatics, pp. 1–5, 2021, doi: https://doi.org/10.1109/ccci52664.2021.9583217
Mughal MA, Luo X, Ullah A, Ullah S, Mahmood Z (2018) A lightweight digital signature based security scheme for human-centered internet of things. IEEE Access 6:31630–31643. https://doi.org/10.1109/ACCESS.2018.2844406
Meshram C, Ibrahim RW, Meshram SG, Jamal SS, Imoize AL (2022) An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture. J Supercomput 78(4):4938–4959. https://doi.org/10.1007/s11227-021-04039-1
Meshram C, Imoize AL, Aljaedi A, Alharbi AR, Jamal SS, Barve SK (2021) An efficient electronic cash system based on certificateless group signcryption scheme using conformable chaotic maps. Sensors 21(21):7039
Jegadeesan S, Obaidat MS, Vijayakumar P, Azees M, Karuppiah M (2021) Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. Cluster Comput. https://doi.org/10.1007/s10586-021-03390-5
Meshram C, Imoize AL, Aljaedi A, Alharbi AR, Jamal SS, Barve SK (2021) A provably secure IBE transformation model for PKC using conformable chebyshev chaotic maps under human-centered IoT environments. Sensors 21(21):7227. https://doi.org/10.3390/s21217227
Meshram C, Ibrahim RW, Meshram SG, Imoize AL, Jamal SS, Barve SK (2022) An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J Supercomput. https://doi.org/10.1007/s11227-021-04280-8
Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. Public Key Cryptogr - PKC 2006:330–346
Guo F, Mu Y (2008) Optimal online/offline signature: how to sign a message without online computation. Provable security. Springer, Berlin, pp 98–111
Guo F, Mu Y, Susilo W (2011) Efficient online/offline signatures with computational leakage resilience in online phase. Information security and cryptology. Spinger, Berlin, pp 455–470
Yao AC, Zhao Y (2013) Online/offline signatures for low-power devices. IEEE Trans Inf Forensics Secur 8(2):283–294. https://doi.org/10.1109/TIFS.2012.2232653
Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39
Gao Y, Zeng P, Choo KKR, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151
Zheng M, Yang S-J, Wu W, Shao J, Huang X (2018) A new design of online/offline signatures based on lattice. Information security practice and experience. Springer, Berlin, pp 198–212
Addobea AA, Hou J, Li Q (2020) MHCOOS: An offline-online certificateless signature scheme for M-health devices. Secur Commun Networks 2020:7085623. https://doi.org/10.1155/2020/7085623
Ajani TS, Imoize AL, Atayero AA (2021) An overview of machine learning within embedded and mobile devices – optimizations and applications. Sensors 21(13):4412. https://doi.org/10.3390/s21134412
Barbosa M, Farshim P (2008) Certificateless signcryption, In: Proc. 2008 ACM Symp. Information, Comput. Commun. Secur. ASIACCS ’08, pp. 369–372, 2008, doi: https://doi.org/10.1145/1368310.1368364
Aranha D, Castro R, Lopez J, Dahab R (2008) Efficient certificateless signcryption, In: 8o Simpósio Bras. em, pp. 257–258, 2008, [Online]. Available: http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf
Li F, Shirase M, Takagi T (2009) Certificateless hybrid signcryption, In: Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5451 LNCS, no. Ispec, pp. 112–123, 2009, doi: https://doi.org/10.1007/978-3-642-00843-6_11
Liu Z, Hu Y, Zhang X, Ma H (2010) Certificateless signcryption scheme in the standard model. Inf Sci (NY) 180(3):452–464. https://doi.org/10.1016/j.ins.2009.10.011
Yang G, Tan CH (2011) Certificateless cryptography with KGC trust level 3. Theor Comput Sci 412(39):5446–5457. https://doi.org/10.1016/j.tcs.2011.06.015
Li F, Xie D, Gao W, Chen K, Wang G, Metere R (2017) A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0553-x
F. Li, W. Gao, D. Xie, and C. Tang (2017) Certificateless cryptography with KGC trust level 3 revisited, In: International Conference on Cloud Computing and Security, 2017, pp. 292–304
Miao S, Zhang F, Li S, Mu Y (2013) On security of a certificateless signcryption scheme. Inf Sci (NY) 232:475–481. https://doi.org/10.1016/j.ins.2011.11.045
Yu H, Yang B (2017) Pairing-free and secure certificateless signcryption scheme. Comput J 60(8):1187–1196. https://doi.org/10.1093/comjnl/bxx005
Liu J, Zhang L, Sun R, Du X, Guizani M (2018) Mutual heterogeneous signcryption schemes for 5G network slicings. Wireless Netw. https://doi.org/10.1007/s11276-021-02547-9
Zhou C (2018) Certificateless signcryption scheme without random oracles. Chinese J Electron 27(5):1002–1008. https://doi.org/10.1049/cje.2018.06.002
Luo M, Wan Y (2018) An enhanced certificateless signcryption in the standard model. Wirel Pers Commun 98(3):2693–2709. https://doi.org/10.1007/s11277-017-4995-4
Rastegari P, Susilo W, Dakhlalian M (2019) Efficient certificateless signcryption in the standard model: revisiting luo and wan’s scheme from wireless personal communications (2018). Comput J 62(8):1178–1193
Guo Z (2019) Cryptanalysis of a certificateless conditional privacy-preserving authentication scheme for wireless body area networks. Int J Electron Inf Eng 11(1):1–8
Gao G, Peng X, Jin L (2019) Efficient access control scheme with certificateless signcrytion for wireless body area networks. Int J Netw Secur 21(3):428–437. https://doi.org/10.1109/JSEN.2016.2554625
Ullah I et al (2019) A Lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications. Symmetry (Basel) 11(11):1386. https://doi.org/10.3390/sym11111386
Yuan Y (2020) Security analysis of an enhanced certificateless signcryption in the standard model. Wirel Pers Commun 112(1):387–394. https://doi.org/10.1007/s11277-020-07031-9
Mandal S, Bera B, Sutrala AK, Das AK, Choo KKR, Park YH (2020) Certificateless-signcryption-based three-factor user access control scheme for IoT environment. IEEE Internet Things J 7(4):3184–3197. https://doi.org/10.1109/JIOT.2020.2966242
Wu C, Huang H, Zhou K, Xu C (2021) Cryptanalysis and Improvement of a new certificateless signature scheme in the standard model. China Commun. https://doi.org/10.1007/s11704-013-3090-6
Shim KA (2019) A new certificateless signature scheme provably secure in the standard model. IEEE Syst J 13(2):1421–1430. https://doi.org/10.1109/JSYST.2018.2844809
Tiwari D, Gangadharan GR (2021) SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing. Humaniz Comput J Ambient Intell. https://doi.org/10.1007/s12652-020-02864-5
Wu B, Wang C, Yao H (2021) A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-01028-8
Yeh HT, Sun HM, Hwang T (2003) Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J Inf Sci Eng 19(6):1059–1070
Abdalla M, Fouque P-A, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. IEE Proceed-Inf. Secur 153(1):27–39
Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393. https://doi.org/10.1109/TCSI.2005.851701
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674. https://doi.org/10.1016/j.chaos.2006.09.047
Lee C-C, Hsu C-W (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1):201–211. https://doi.org/10.1007/s11071-012-0652-3
Kac VG, Cheung P (2002) Quantum calculus, vol 113. Springer, Berlin
Ibrahim RW, Elobaid RM, Obaiys SJ (2020) A class of quantum Briot-Bouquet differential equations with complex coefficients. Mathematics 8(5):794
Jackson FH (1910) On Q-Definite Integrals. Q J Pure Appl Math 41:193–203
Mohanty S, Majhi B, Das S (2013) A secure electronic cash based on a certificateless group signcryption scheme. Math Comput Model 58(1–2):186–195. https://doi.org/10.1016/j.mcm.2012.06.004
Lin X-J, Sun L, Qu H, Liu D (2018) Cryptanalysis of A pairing-free certificateless signcryption scheme. Comput J 61(4):539–544
Cao L, Ge W (2018) Analysis of certificateless signcryption schemes and construction of a secure and efficient pairing-free one based on ECC. KSII Trans Internet Inf Syst 12(9):4527–4547
Luo W, Ma W (2019) Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage. Electronics 8(5):590
Acknowledgements
The authors would like to thank anonymous reviewers of the Journal of Supercomputing for their careful and helpful comments.
Author information
Authors and Affiliations
Contributions
Conceptualization contributed by CM; RWI; formal analysis contributed by ALI; IB; investigation contributed by CM; RWI; ALI; methodology contributed by CM; RWI; ALI; resources contributed by CM; software contributed by ALI; IB; supervision contributed by CM; PP; SGM; RWI; validation/visualization contributed by CM; SGM; RWI; writing—original draft contributed by CM; RWI; ALI; writing—review and editing contributed by CM; RWI; PP; ALI; SGM.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Meshram, C., Ibrahim, R.W., Yupapin, P. et al. An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments. J Supercomput 79, 16914–16939 (2023). https://doi.org/10.1007/s11227-023-05303-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05303-2