File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

TitleCompatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT
Authors
KeywordsIdentity-based cryptography
Certificateless cryptography
IoT systems
Lightweight cryptography
Issue Date2020
PublisherSpringer.
Citation
Proceedings of the 23rd International Conference on Information Security (ISC) 2020: Information Security, Bali, Indonesia, 16–18 December 2020. In Susilo, W ... et al (eds.), Information Security. ISC 2020, p. 39-58 How to Cite?
AbstractCertificates ensure the authenticity of users’ public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achieving compatible identity-based and certificateless systems to allow users from different domains (identity-based or certificateless) to communicate seamlessly. Moreover, more efficient constructions can enable their adoption in resource-limited IoTs. In this work, we propose new identity-based and certificateless cryptosystems that provide such compatibility and efficiency. This feature is beneficial for heterogeneous IoT settings (e.g., commercial aerial drones), where different levels of trust/control is assumed on the trusted third party. Our schemes are more communication efficient than their public key based counterparts, as they do not need certificate processing. Our experimental analysis on both commodity and embedded IoT devices show that, only with the cost of having a larger system public key, our cryptosystems are more computation and communication efficient than their certificate-free counterparts. We prove the security of our schemes (in the random oracle model) and open-source our cryptographic framework for public testing/adoption.
Persistent Identifierhttp://hdl.handle.net/10722/297176
ISBN
Series/Report no.Lecture Notes in Computer Science (LNCS) ; v.12472

 

DC FieldValueLanguage
dc.contributor.authorBehnia, R-
dc.contributor.authorYavuz, AA-
dc.contributor.authorOzmen, MO-
dc.contributor.authorYuen, TH-
dc.date.accessioned2021-03-08T07:15:14Z-
dc.date.available2021-03-08T07:15:14Z-
dc.date.issued2020-
dc.identifier.citationProceedings of the 23rd International Conference on Information Security (ISC) 2020: Information Security, Bali, Indonesia, 16–18 December 2020. In Susilo, W ... et al (eds.), Information Security. ISC 2020, p. 39-58-
dc.identifier.isbn9783030629731-
dc.identifier.urihttp://hdl.handle.net/10722/297176-
dc.description.abstractCertificates ensure the authenticity of users’ public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achieving compatible identity-based and certificateless systems to allow users from different domains (identity-based or certificateless) to communicate seamlessly. Moreover, more efficient constructions can enable their adoption in resource-limited IoTs. In this work, we propose new identity-based and certificateless cryptosystems that provide such compatibility and efficiency. This feature is beneficial for heterogeneous IoT settings (e.g., commercial aerial drones), where different levels of trust/control is assumed on the trusted third party. Our schemes are more communication efficient than their public key based counterparts, as they do not need certificate processing. Our experimental analysis on both commodity and embedded IoT devices show that, only with the cost of having a larger system public key, our cryptosystems are more computation and communication efficient than their certificate-free counterparts. We prove the security of our schemes (in the random oracle model) and open-source our cryptographic framework for public testing/adoption.-
dc.languageeng-
dc.publisherSpringer.-
dc.relation.ispartofInternational Conference on Information Security, ISC 2020-
dc.relation.ispartofseriesLecture Notes in Computer Science (LNCS) ; v.12472-
dc.subjectIdentity-based cryptography-
dc.subjectCertificateless cryptography-
dc.subjectIoT systems-
dc.subjectLightweight cryptography-
dc.titleCompatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT-
dc.typeConference_Paper-
dc.identifier.emailYuen, TH: johnyuen@hku.hk-
dc.identifier.authorityYuen, TH=rp02426-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-030-62974-8_3-
dc.identifier.scopuseid_2-s2.0-85097574710-
dc.identifier.hkuros321451-
dc.identifier.spage39-
dc.identifier.epage58-
dc.publisher.placeCham-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats