Privacy-Preserving Mutual Heterogeneous Signcryption Schemes Based on 5G Network Slicing
نویسندگان
چکیده
With the wide application of 5G network, much research has been carried out in recent years toward network slicing technology order to save resources and satisfy service requirements different users. Different public key cryptosystems may be deployed slicings. Therefore, heterogeneous signcryption is required achieve secure communications between slices. The existing scheme a one-to-one communication To obtain one-to-many many-to-one communications, two new privacy-preserving schemes have proposed this article based on slicings, which can accomplish mutual infrastructure (PKI) certificateless public-key cryptography. In work, we present PKI $\to $ CLC completely anonymous multireceiver (PMRCHS) aggregate (CPHAS) Internet Things (IoT) Vehicle (IoV) slicing. Under random oracle model (ROM), proved confidentiality unforgeability under computational Diffie–Hellman problem discrete logarithm (DLP). Furthermore, make comparisons work with works terms cost, anonymity, direction. results show that are more effective.
منابع مشابه
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...
متن کاملPrivacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data
In this paper, we propose a post randomization technique to learn a Bayesian network (BN) from distributed heterogeneous data, in a privacy sensitive fashion. In this case, two or more parties own sensitive data but want to learn a Bayesian network from the combined data. We consider both structure and parameter learning for the BN. The only required information from the data set is a set of su...
متن کاملIBIHOP: Proper Privacy Preserving Mutual RFID Authentication
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the...
متن کاملPrivacy-Preserving Schema Matching Using Mutual Information
The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally media...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2022.3163607