Provably secure and lightweight certificateless signature scheme for IIoT environments

A Karati, SKH Islam, M Karuppiah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …

Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

Privacy-preserving aware data transmission for IoT-based e-health

R Boussada, B Hamdane, ME Elhdhili, LA Saidane - Computer Networks, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …

Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment

A Karati, R Amin, SKH Islam… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Secure and efficient file storage and sharing via authenticated physical devices remain
challenging to achieve in a cyber-physical cloud environment, particularly due to the …

Reliable data sharing by certificateless encryption supporting keyword search against vulnerable KGC in industrial internet of things

A Karati, CI Fan, ES Zhuang - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends the diversity of data
analysis for decision making with minimized costs in communications and storage. However …

Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments

B Zhang, T Zhu, C Hu, C Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes
can provide message authentication with no use of traditional digital certificates. High …

A secure data transmission protocol for cloud‐assisted edge‐Internet of Things environment

M Kumar, H Kumar Verma… - Transactions on Emerging …, 2020 - Wiley Online Library
Cloud‐edge (CE) is revolutionizing our modern world with a greater user experience
through the Internet of Things (IoT). However, the edge devices, communication bridge …

A secure lightweight signature based authentication for Cloud‐IoT crowdsensing environments

M Kumar, HK Verma, G Sikka - Transactions on Emerging …, 2019 - Wiley Online Library
Crowdsensing utilizes the wisdom of crowd by sensing the information through different
types of smart devices such as a smartphone, tablet, and sensors to serve the problem of …

Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography

C Meshram, MS Obaidat, SG Meshram - Security and Privacy, 2018 - Wiley Online Library
Recently, chaos has been dealt with as a decent approach to reduce computational
complexity while fulfilling security necessities of a cryptographic technique. Cloud storage …

A novel threshold signature scheme based on elliptic curve with designated verifier

Y Liu, T Liu - Artificial Intelligence and Security: 5th International …, 2019 - Springer
Aiming at the security threats and computational complexity of existing threshold signature
schemes, this paper proposes a threshold signature scheme based on elliptic curve. The …