Your browser doesn't support javascript.
loading
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Meshram, Chandrashekhar; Imoize, Agbotiname Lucky; Aljaedi, Amer; Alharbi, Adel R; Jamal, Sajjad Shaukat; Barve, Sharad Kumar.
Afiliação
  • Meshram C; Department of Post Graduate Studies and Research in Mathematics, Jaywanti Haksar Govt. Post-Graduation College, College of Chhindwara University, Betul 460001, India.
  • Imoize AL; Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria.
  • Aljaedi A; Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801 Bochum, Germany.
  • Alharbi AR; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
  • Jamal SS; College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.
  • Barve SK; Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia.
Sensors (Basel) ; 21(21)2021 Oct 30.
Article em En | MEDLINE | ID: mdl-34770535
ABSTRACT
The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.
Assuntos
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Segurança Computacional / Confidencialidade Limite: Humans Idioma: En Ano de publicação: 2021 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Segurança Computacional / Confidencialidade Limite: Humans Idioma: En Ano de publicação: 2021 Tipo de documento: Article