Analyzing the Security and Efficiency of Pairing-free Directed Signature Schemes on Elliptic Curve Cryptography
DOI:
https://doi.org/10.29070/2wffdw49Keywords:
crypto-graphic, Blind signature, elliptic curve, storage capacity, cryptosystemAbstract
Communications have grown at an exponential rate throughout the modern period. The need of security in contexts with limited resources has been highlighted by applications such as online banking, personal digital assistants, mobile communication, smartcards, etc. With low key sizes and good security on par with other common public key techniques, elliptic curve cryptography (ECC) is an ideal tool for cryptography. ECC is a method of data encryption that relies on keys. Encryption and decryption are the main focusses of ECC, which relies on public and private key pairs.
The Elliptic Curve Discrete Logarithm Problem (ECDLP) is a computationally intractable inverse process that gives rise to ECC methods, which are based on scalar multiplication of elliptic curve points. An exhaustive examination of the difficulties in creating ECC-based systems was accompanied by an assessment of current ECC solutions. Domain parameter selection, scalar multiplication, point multiplication, elliptic curve generation, key generation, key size selection, security measures, applications, and so on are some of the difficulties highlighted in the study.
References
Gayathri, N. B. & Gowri, T. & Rao, R.R.V. & Reddy, Vasudeva. (2018). Efficient and secure pairing-free certificateless directed signature scheme. Journal of King Saud University - Computer and Information Sciences. 33. 10.1016/j.jksuci.2018.02.016.
Gayathri, N. B. & Rao, R. & deva, P Vasu. (2017). Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme. 28-38. 10.1007/978-981-10-6898-0_3.
Gayathri, N. B. & Gowri, T. & Kumar, P. & Mohammad, Zia Ur Rahman & Reddy, Vasudeva & Lay-Ekuakille, Aimer. (2019). Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks. IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2019.2927089.
Wei, Qian & Shao, Huiying. (2009). A directed signature scheme and its application to group key initial distribution. ACM International Conference Proceeding Series. 403. 265-269. 10.1145/1655925.1655972.
Gayathri, N. B. & Gowri, T. & Kumar, P. & Mohammad, Zia Ur Rahman & Reddy, Vasudeva & Lay-Ekuakille, Aimer. (2019). Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks. IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2019.2927089.
X. Zhu, S. Jiang, L. Wang and H. Li, “Efficient privacy preserving authentication for vehicular ad hoc networks,” IEEE transactions on vehicular technology, vol. 63, no. 2, pp. 907-919, 2014.
F. Wang, Y. Xu, H. Zhang, Y. Zhang and L. Zhu, “2FLIP: A two factor lightweight privacy preserving authentication scheme for VANET” IEEE transactions on vehicular technology, vol. 65, no. 2, pp. 896-910, 2016. [5]
X. Lin, X. Sun, P. H. Ho, and X. Shen, “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442– 3456, 2007.
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no.7, pp. 3589–3603, 2010.
H. Lu, and L. Jie, “Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey,” Wireless Communications and Mobile Computing, vol. 16, no. 6, pp. 643- 655, 2016. [18]
Y. Wang, H. Zhong, Y. Xu, J. Cui, and F. Guo, “Efficient extensible conditional privacypreserving authentication scheme supporting batch verification for VANETs,” Security and communication networks, vol. 9, no.18, pp. 5460- 5471, 2016
S. F. Tzeng, S. J. Horng, T. Li, X. Wang, P.H. Huang, and M. K. Khan, “Enhancing security and privacy for Identity-based batch verification scheme in VANET,” IEEE transactions on vehicular technology, vol. 66, no. 4, pp. 3235- 3248, 2017. [20]
X. Hu, J. Wang, H.Xu, Y.Liu, and X. Zhang “Secure and pairing-free Identity-based batch verification scheme in vehicle ad-hoc networks, ” in Proc. of ICIC-2016,Part III, LNAI 9773, 2016, pp. 11-20.
J. Cui, J. Zhang, H. Zhong, and Y. Xu, “SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter,” IEEE transactions on vehicular technology, vol. 66, no.11, pp. 10283-10295, 2017. [22]
Al-Riyami, S. S., Paterson, K.G., Certificateless Public key Cryptography. LNCS, vol. 2894, pp. 452-473. 2003