Skip to main content
Log in

An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Signcryption is a highly efficient approach to simultaneously achieving message confidentiality and authentication in Human-Centered IoT (HC-IoT) systems. HCIoT is a new field of study that links various aspects of life such as smart cards, business, e-commerce, healthcare, and sensitive private data. A number of intelligent systems favor human intervention to start automated tasks. A number of smart devices have a social effect in that they should be capable of changing their functional model based on the behavior of different humans. It has boosted the development of information exchange over the IoT and enabled networks. It encompasses cellular, vehicular, and human healthcare by utilizing middleware. Currently, group signcryption schemes are gaining widespread popularity in HC-IoT environments. HC-IoT is useful in electronic cash systems, lightweight devices, multi-server networks, and more. However, most signcryption schemes use bilinear pairing that is computationally intensive, and there is a need for more efficient signcryption schemes. In order to solve this issue, this paper introduces an efficient Certificateless Group-oriented Signcryption (CGS) scheme using Quantum Chebyshev Chaotic Maps (QCCM) without employing bilinear pairing. The proposed QCCM-CGS scheme’s standout feature is that any group signcrypter can signcrypt a text/information with the group manager (GM) and then present it to the verifier for verification. By using the public conditions of the group, the verifier approves the validity of the signcrypted text and cannot connect the signcrypted text to the conforming signcrypter. However, a legitimate signcrypted text cannot be generated even by the GM or any signcrypter of that group unaccompanied. In situations where there is a legal disagreement, such as non-repudiation of the signature, the GM can reveal the identity of the signcrypter. The presented scheme is adequately secured from the indistinguishably chosen ciphertext attack. The computationally challenging problem, QCCM, is used as the foundation for the construction of traceability, unforgeability, unlinkability, and security. Lastly, the security review of the projected scheme clearly shows significant consistency, and it can be easily deployed in vulnerable security applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Imoize AL, Adedeji O, Tandiya N, Shetty S (2021) 6G enabled smart infrastructure for sustainable society: opportunities, challenges, and research roadmap. Sensors 21(5):1–58. https://doi.org/10.3390/s21051709

    Article  Google Scholar 

  2. Singh J, Gimekar A, Venkatesan S (2019) An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int J Commun Syst. https://doi.org/10.1002/dac.4189

    Article  Google Scholar 

  3. Meshram C, Obaidat MS, Hsiao KF, Imoize AL, Meshram A (2021) An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee. In: 2021 Int Conf Commun. Comput. Cybersecurity, Informatics, pp. 1–5, 2021, doi: https://doi.org/10.1109/ccci52664.2021.9583217

  4. Mughal MA, Luo X, Ullah A, Ullah S, Mahmood Z (2018) A lightweight digital signature based security scheme for human-centered internet of things. IEEE Access 6:31630–31643. https://doi.org/10.1109/ACCESS.2018.2844406

    Article  Google Scholar 

  5. Meshram C, Ibrahim RW, Meshram SG, Jamal SS, Imoize AL (2022) An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture. J Supercomput 78(4):4938–4959. https://doi.org/10.1007/s11227-021-04039-1

    Article  Google Scholar 

  6. Meshram C, Imoize AL, Aljaedi A, Alharbi AR, Jamal SS, Barve SK (2021) An efficient electronic cash system based on certificateless group signcryption scheme using conformable chaotic maps. Sensors 21(21):7039

    Article  Google Scholar 

  7. Jegadeesan S, Obaidat MS, Vijayakumar P, Azees M, Karuppiah M (2021) Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. Cluster Comput. https://doi.org/10.1007/s10586-021-03390-5

    Article  Google Scholar 

  8. Meshram C, Imoize AL, Aljaedi A, Alharbi AR, Jamal SS, Barve SK (2021) A provably secure IBE transformation model for PKC using conformable chebyshev chaotic maps under human-centered IoT environments. Sensors 21(21):7227. https://doi.org/10.3390/s21217227

    Article  Google Scholar 

  9. Meshram C, Ibrahim RW, Meshram SG, Imoize AL, Jamal SS, Barve SK (2022) An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J Supercomput. https://doi.org/10.1007/s11227-021-04280-8

    Article  Google Scholar 

  10. Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. Public Key Cryptogr - PKC 2006:330–346

    MathSciNet  MATH  Google Scholar 

  11. Guo F, Mu Y (2008) Optimal online/offline signature: how to sign a message without online computation. Provable security. Springer, Berlin, pp 98–111

    Chapter  Google Scholar 

  12. Guo F, Mu Y, Susilo W (2011) Efficient online/offline signatures with computational leakage resilience in online phase. Information security and cryptology. Spinger, Berlin, pp 455–470

    Chapter  Google Scholar 

  13. Yao AC, Zhao Y (2013) Online/offline signatures for low-power devices. IEEE Trans Inf Forensics Secur 8(2):283–294. https://doi.org/10.1109/TIFS.2012.2232653

    Article  Google Scholar 

  14. Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39

    Google Scholar 

  15. Gao Y, Zeng P, Choo KKR, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151

    Google Scholar 

  16. Zheng M, Yang S-J, Wu W, Shao J, Huang X (2018) A new design of online/offline signatures based on lattice. Information security practice and experience. Springer, Berlin, pp 198–212

    Chapter  Google Scholar 

  17. Addobea AA, Hou J, Li Q (2020) MHCOOS: An offline-online certificateless signature scheme for M-health devices. Secur Commun Networks 2020:7085623. https://doi.org/10.1155/2020/7085623

    Article  Google Scholar 

  18. Ajani TS, Imoize AL, Atayero AA (2021) An overview of machine learning within embedded and mobile devices – optimizations and applications. Sensors 21(13):4412. https://doi.org/10.3390/s21134412

    Article  Google Scholar 

  19. Barbosa M, Farshim P (2008) Certificateless signcryption, In: Proc. 2008 ACM Symp. Information, Comput. Commun. Secur. ASIACCS ’08, pp. 369–372, 2008, doi: https://doi.org/10.1145/1368310.1368364

  20. Aranha D, Castro R, Lopez J, Dahab R (2008) Efficient certificateless signcryption, In: 8o Simpósio Bras. em, pp. 257–258, 2008, [Online]. Available: http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf

  21. Li F, Shirase M, Takagi T (2009) Certificateless hybrid signcryption, In: Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5451 LNCS, no. Ispec, pp. 112–123, 2009, doi: https://doi.org/10.1007/978-3-642-00843-6_11

  22. Liu Z, Hu Y, Zhang X, Ma H (2010) Certificateless signcryption scheme in the standard model. Inf Sci (NY) 180(3):452–464. https://doi.org/10.1016/j.ins.2009.10.011

    Article  MathSciNet  MATH  Google Scholar 

  23. Yang G, Tan CH (2011) Certificateless cryptography with KGC trust level 3. Theor Comput Sci 412(39):5446–5457. https://doi.org/10.1016/j.tcs.2011.06.015

    Article  MathSciNet  MATH  Google Scholar 

  24. Li F, Xie D, Gao W, Chen K, Wang G, Metere R (2017) A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0553-x

    Article  Google Scholar 

  25. F. Li, W. Gao, D. Xie, and C. Tang (2017) Certificateless cryptography with KGC trust level 3 revisited, In: International Conference on Cloud Computing and Security, 2017, pp. 292–304

  26. Miao S, Zhang F, Li S, Mu Y (2013) On security of a certificateless signcryption scheme. Inf Sci (NY) 232:475–481. https://doi.org/10.1016/j.ins.2011.11.045

    Article  MathSciNet  MATH  Google Scholar 

  27. Yu H, Yang B (2017) Pairing-free and secure certificateless signcryption scheme. Comput J 60(8):1187–1196. https://doi.org/10.1093/comjnl/bxx005

    Article  Google Scholar 

  28. Liu J, Zhang L, Sun R, Du X, Guizani M (2018) Mutual heterogeneous signcryption schemes for 5G network slicings. Wireless Netw. https://doi.org/10.1007/s11276-021-02547-9

    Article  Google Scholar 

  29. Zhou C (2018) Certificateless signcryption scheme without random oracles. Chinese J Electron 27(5):1002–1008. https://doi.org/10.1049/cje.2018.06.002

    Article  Google Scholar 

  30. Luo M, Wan Y (2018) An enhanced certificateless signcryption in the standard model. Wirel Pers Commun 98(3):2693–2709. https://doi.org/10.1007/s11277-017-4995-4

    Article  Google Scholar 

  31. Rastegari P, Susilo W, Dakhlalian M (2019) Efficient certificateless signcryption in the standard model: revisiting luo and wan’s scheme from wireless personal communications (2018). Comput J 62(8):1178–1193

    Article  MathSciNet  Google Scholar 

  32. Guo Z (2019) Cryptanalysis of a certificateless conditional privacy-preserving authentication scheme for wireless body area networks. Int J Electron Inf Eng 11(1):1–8

    Google Scholar 

  33. Gao G, Peng X, Jin L (2019) Efficient access control scheme with certificateless signcrytion for wireless body area networks. Int J Netw Secur 21(3):428–437. https://doi.org/10.1109/JSEN.2016.2554625

    Article  Google Scholar 

  34. Ullah I et al (2019) A Lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications. Symmetry (Basel) 11(11):1386. https://doi.org/10.3390/sym11111386

    Article  Google Scholar 

  35. Yuan Y (2020) Security analysis of an enhanced certificateless signcryption in the standard model. Wirel Pers Commun 112(1):387–394. https://doi.org/10.1007/s11277-020-07031-9

    Article  MathSciNet  Google Scholar 

  36. Mandal S, Bera B, Sutrala AK, Das AK, Choo KKR, Park YH (2020) Certificateless-signcryption-based three-factor user access control scheme for IoT environment. IEEE Internet Things J 7(4):3184–3197. https://doi.org/10.1109/JIOT.2020.2966242

    Article  Google Scholar 

  37. Wu C, Huang H, Zhou K, Xu C (2021) Cryptanalysis and Improvement of a new certificateless signature scheme in the standard model. China Commun. https://doi.org/10.1007/s11704-013-3090-6

    Article  Google Scholar 

  38. Shim KA (2019) A new certificateless signature scheme provably secure in the standard model. IEEE Syst J 13(2):1421–1430. https://doi.org/10.1109/JSYST.2018.2844809

    Article  Google Scholar 

  39. Tiwari D, Gangadharan GR (2021) SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing. Humaniz Comput J Ambient Intell. https://doi.org/10.1007/s12652-020-02864-5

    Article  Google Scholar 

  40. Wu B, Wang C, Yao H (2021) A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-01028-8

    Article  Google Scholar 

  41. Yeh HT, Sun HM, Hwang T (2003) Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J Inf Sci Eng 19(6):1059–1070

    Google Scholar 

  42. Abdalla M, Fouque P-A, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. IEE Proceed-Inf. Secur 153(1):27–39

    Article  MATH  Google Scholar 

  43. Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393. https://doi.org/10.1109/TCSI.2005.851701

    Article  MathSciNet  MATH  Google Scholar 

  44. Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674. https://doi.org/10.1016/j.chaos.2006.09.047

    Article  MathSciNet  MATH  Google Scholar 

  45. Lee C-C, Hsu C-W (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1):201–211. https://doi.org/10.1007/s11071-012-0652-3

    Article  MathSciNet  Google Scholar 

  46. Kac VG, Cheung P (2002) Quantum calculus, vol 113. Springer, Berlin

    Book  MATH  Google Scholar 

  47. Ibrahim RW, Elobaid RM, Obaiys SJ (2020) A class of quantum Briot-Bouquet differential equations with complex coefficients. Mathematics 8(5):794

    Article  Google Scholar 

  48. Jackson FH (1910) On Q-Definite Integrals. Q J Pure Appl Math 41:193–203

    MATH  Google Scholar 

  49. Mohanty S, Majhi B, Das S (2013) A secure electronic cash based on a certificateless group signcryption scheme. Math Comput Model 58(1–2):186–195. https://doi.org/10.1016/j.mcm.2012.06.004

    Article  MathSciNet  MATH  Google Scholar 

  50. Lin X-J, Sun L, Qu H, Liu D (2018) Cryptanalysis of A pairing-free certificateless signcryption scheme. Comput J 61(4):539–544

    Article  Google Scholar 

  51. Cao L, Ge W (2018) Analysis of certificateless signcryption schemes and construction of a secure and efficient pairing-free one based on ECC. KSII Trans Internet Inf Syst 12(9):4527–4547

    Google Scholar 

  52. Luo W, Ma W (2019) Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage. Electronics 8(5):590

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank anonymous reviewers of the Journal of Supercomputing for their careful and helpful comments.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization contributed by CM; RWI; formal analysis contributed by ALI; IB; investigation contributed by CM; RWI; ALI; methodology contributed by CM; RWI; ALI; resources contributed by CM; software contributed by ALI; IB; supervision contributed by CM; PP; SGM; RWI; validation/visualization contributed by CM; SGM; RWI; writing—original draft contributed by CM; RWI; ALI; writing—review and editing contributed by CM; RWI; PP; ALI; SGM.

Corresponding author

Correspondence to Chandrashekhar Meshram.

Ethics declarations

Competing interests

The authors declare no competing interests.

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meshram, C., Ibrahim, R.W., Yupapin, P. et al. An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments. J Supercomput 79, 16914–16939 (2023). https://doi.org/10.1007/s11227-023-05303-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05303-2

Keywords

Navigation