Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
نویسندگان
چکیده
The rapid progress in the internet requires multiple message communication over the wider area to improve the mobile network security. Due to the multiple message communication, the security is a most important concern in mobile network. The bilinear Certificate less Aggregate Signcryption Scheme guarantees the security under several attacks, and therefore provides security and non-repudiation. However, the multiple messages through a single operation are a difficult task to improve the network security. In addition, multilinear map based signcryption scheme provides the confidentiality and authenticity but it is complicated for handling when number of messages gets increased rapidly. In order to overcome the problem in multiple message communication, Exponentiated Multilinear Vectorized Certificateless Signcryption (EMV-CLSC) technique is introduced. The EMV-CLSC technique is used to verify the multiple messages through a single Signcryption process. An efficient certificate less signcryption technique performs the multiple message communication between senders andreceiver to ensure the network security. In EMV-CLSC, the multilinear vectorized model is applied for handling the high volume of data and multiple data format while distributing the message simultaneously. This helps to reduce the memory consumption while processing the multiple data. The proposed EMV-CLSC technique provably improves the security with public key verifiability and cipher text authenticity. Based on, the authorized users only access the network and the messages are protected. At last, the Broadcast message is secured using Digital Signature verification in uncsigncryption process. A certificate less signcryption process with multiple bits is used to highly secure the multiple messages using EMV-CLSC technique. This helps to protect the messages against the attacks and improve the mobile network security. An experimental result shows that the proposed EMV-CLSC technique improves the network security in terms of computational cost, memory consumption, communication overhead and secured message distributing rate compared to the state-of-the-art works.
منابع مشابه
Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authen...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملAn Improved Certificateless Signcryption in the Standard Model
Signcryption is a cryptographic primitive which can offer simultaneously security requirements of confidentiality and authentication, and is more efficient than the traditional sign-then-encrypt way. Recently, Liu et al. proposed the first certificateless signcryption scheme in the standard model. However, their scheme is proved to have some security weaknesses. In this paper, we propose a corr...
متن کاملAn Efficient Biometric Certificateless Signcryption Scheme
Biometric signcryption, which enables a user using his biometric information as the identity to fulfills both the functions of encryption and digital signature simultaneously, and it provides better overall security and performance. However, almost all biometric signcryption schemes that have been proposed in the literature do not satisfy forward secrecy, known session-specific temporary inform...
متن کاملCertificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017