Privacy-Preserving Mutual Heterogeneous Signcryption Schemes Based on 5G Network Slicing

نویسندگان

چکیده

With the wide application of 5G network, much research has been carried out in recent years toward network slicing technology order to save resources and satisfy service requirements different users. Different public key cryptosystems may be deployed slicings. Therefore, heterogeneous signcryption is required achieve secure communications between slices. The existing scheme a one-to-one communication To obtain one-to-many many-to-one communications, two new privacy-preserving schemes have proposed this article based on slicings, which can accomplish mutual infrastructure (PKI) certificateless public-key cryptography. In work, we present PKI $\to $ CLC completely anonymous multireceiver (PMRCHS) aggregate (CPHAS) Internet Things (IoT) Vehicle (IoV) slicing. Under random oracle model (ROM), proved confidentiality unforgeability under computational Diffie–Hellman problem discrete logarithm (DLP). Furthermore, make comparisons work with works terms cost, anonymity, direction. results show that are more effective.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...

متن کامل

Privacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data

In this paper, we propose a post randomization technique to learn a Bayesian network (BN) from distributed heterogeneous data, in a privacy sensitive fashion. In this case, two or more parties own sensitive data but want to learn a Bayesian network from the combined data. We consider both structure and parameter learning for the BN. The only required information from the data set is a set of su...

متن کامل

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication

One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the...

متن کامل

Privacy-Preserving Schema Matching Using Mutual Information

The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally media...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2022

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2022.3163607