Wireless Personal Communications

, Volume 84, Issue 2, pp 1469–1485 | Cite as

Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks

Article

Abstract

Signcryption is a novel cryptographic primitive, which enables a user to perform digital signature (providing authenticity) and public key encryption (providing message confidentiality) simultaneously in a single logical step with a cost lesser than sign-then-encrypt approach. Without revealing the identity of the user (maintaining anonymity), ring signcryption can provide confidentiality and authenticity both. In this paper, a Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks has been proposed. In addition, existing certificateless ring signcryption schemes have been analyzed based on various parameters. A comparison illustrating the computational cost has been prepared, which can be helpful in deciding the efficiency and security of the algorithm. Also, the proposed approach has been evaluated for Wireless Sensor Networks (WSN). The experimental evaluation of the PF-CLRSC algorithm on MICAz sensor mote, using TinyOS and RELIC-Toolkit cryptographic library proved the feasibility of the proposed scheme.

Keywords

WSN Certificateless ring signcryption Pairing-free 

References

  1. 1.
    Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRefGoogle Scholar
  2. 2.
    Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2007). Security in distributed, grid, and pervasive computing, chapter 17 wireless sensor network security: A survey, pp. 1–51. CRC Press.Google Scholar
  3. 3.
    Olariu, S., & Xu, Q. (2005). Information assurance in wireless sensor networks. In Proceedings of the IEEE international symposium on parallel and distributed processing, volume 13, p. 236a. Los Alamitos, CA, USA: IEEE Computer Society.Google Scholar
  4. 4.
    Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology volume 196 of Lecture notes in computer science, pp. 47–53. Berlin, Heidelberg: Springer.Google Scholar
  5. 5.
    Al-Riyami, S., & Paterson, K. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 volume 2894 of Lecture notes in computer science, pp. 452–473. Berlin, Heidelberg: Springer.Google Scholar
  6. 6.
    Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Proceedings of the 19th international conference on advanced information networking and applications, volume 2 of AINA ’05. 2, pp. 649–654.Google Scholar
  7. 7.
    Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \({\ll }\) cost (signature) \(+\) cost (encryption). In Advances in cryptologyCRYPTO ’97, volume 1294 of Lecture notes in computer science, pp.165–179. Berlin, Heidelberg: Springer.Google Scholar
  8. 8.
    Miller, V. (1986). Use of elliptic curves in cryptography. In Advances in cryptology CRYPTO 85 proceedings volume 218 of Lecture notes in computer science, pp. 417–426. Berlin, Heidelberg: Springer.Google Scholar
  9. 9.
    Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the 3rd IEEE international conference on pervasive computing and communications, PERCOM ’05, pp. 324–328. Washington, DC, USA: IEEE Computer Society.Google Scholar
  10. 10.
    Rivest, R., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In Advances in cryptology ASIACRYPT 2001 volume 2248 of Lecture notes in computer science, pp. 552–565. Berlin, Heidelberg: Springer.Google Scholar
  11. 11.
    Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In Cryptology and network security volume 3810 of Lecture notes in computer science, pp. 13–25. Berlin, Heidelberg: Springer.Google Scholar
  12. 12.
    Sharma, G., Bala, S., & Verma, A. (2013). An identity-based ring signcryption scheme - Evaluation for wireless sensor networks. IEEK Transactions on Smart Processing & Computing, 2(2), 57–66.Google Scholar
  13. 13.
    Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC ’07, pp. 107–111.Google Scholar
  14. 14.
    Lijun, Z., Futai, Z., & Songqin, M. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES ’10, pp. 423–427.Google Scholar
  15. 15.
    Zhenghua, Q., Geng, G., & Xunyi, R. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106.Google Scholar
  16. 16.
    Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.MATHCrossRefGoogle Scholar
  17. 17.
    Rev. A. (2004) Mpr-mib series user manual. http://www-db.ics.uci.edu/pages/research/quasar/MPR-MIB.
  18. 18.
    Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., & Culler, D. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence, pp. 115–148. Berlin, Heidelberg: Springer.Google Scholar
  19. 19.
    Aranha, D. & Gouvêa, C. RELIC is an Efficient lIbrary for cryptography. http://code.google.com/p/relic-toolkit/.

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Thapar UniversityPatialaIndia

Personalised recommendations