Hyperelliptic Based Signcryption with Sensor-Seeded Random Number
نویسندگان
چکیده
The emerging trend now in network security is lightweight cryptography which is due to the growth of wireless technology. Lightweight cryptography is defined as cryptographic algorithm used to achieve higher security with limited resources. Generally, these wireless systems are in demand of security and resource(power). In order to meet these constraints an important lightweight scheme called signcryption is proposed with security features such as confidentiality, integrity(originality of sender and receiver), message and user authentication, nonrepudiation, forward secrecy and public verifiability. Signcryption fulfils the functions of signature and encryption in one logical. Strength of security and privacy of any cryptographic mechanisms that use random numbers require that the random numbers generated have two important properties namely 1.Uniform distribution and 2.Independence [9]. One idea proposed is to use sensor data as seed for Random Number Generator (RNG) to generate the random numbers that is used for signcryption algorithm in wireless networks [8]. These sensor data also pose weaknesses where sensors may be under adversarial control that may lead to generating expected random sequence which breaks the security and privacy. This paper proposes an approach to process the raw sensor data that increases randomness in the seed value. The generated sequences from two sensors are combined by Decimation method to improve unpredictability. This makes the sensor data to be more secure in generating random numbers preventing attackers from knowing the random sequence through adversarial control. Existing signcryption scheme faces issueslack of forward secrecy and public verifiability, computation and communication overhead, larger memory requirements [1]. The proposed scheme based on hyper elliptic curve (HEC) fulfils all the gaps of existing system [2].
منابع مشابه
Secure Signcryption on Hyper Elliptic Curve with Sensor-Based Random Number
The emerging trend now in network security is efficient signcryption which is due to the growth of wireless technology. Signcryption scheme is proposed with security features such as confidentiality, integrity(originality of sender and receiver), message and user authentication, non-repudiation, forward secrecy and public verifiability. Signcryption fulfils the functions of signature and encryp...
متن کاملCertificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...
متن کاملIntegrating Wireless Sensor Networks into Internet Of Things For Security
A secure channel between a sensor node and internet host is created, hence new security challenges arises and wireless sensor networks is integrated into internet of things. We use heterogeneous online/offline signcryption scheme so that secure communication is provided. We use bilinear diffie-hellman inversion problem in random oracle model, it provides indistinguishability against adaptive ch...
متن کاملA Novel Key Agreement Framework for Wireless Body Area Networks Based on Hyper Elliptic Curves Signcryption
The evolution of WBANs under the medical health care field is vital for human survival and security of patients’ personnel physiological information remains appalling challenge yet to be addressed. This article presents a novel key agreement framework based on HECC signcryption best fit for inter secure communication in the resource constraint environment of WBANs. Shorter key size, low communi...
متن کاملIdentity based signcryption scheme without random oracles
Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step with the cost lower than signature-then-encryption approach.. In this paper we gave attacks on confidentiality and unforgeability of two identity based signcryption schemes without random oracles. Further we proposed an improved identity based signcryption scheme without random oracles. We...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016