A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments

The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the publ...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Chandrashekhar Meshram, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, Sharad Kumar Barve
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/ccb0f7923bbb4e4ea39bb8100b6b35eb
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:ccb0f7923bbb4e4ea39bb8100b6b35eb
record_format dspace
spelling oai:doaj.org-article:ccb0f7923bbb4e4ea39bb8100b6b35eb2021-11-11T19:12:12ZA Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments10.3390/s212172271424-8220https://doaj.org/article/ccb0f7923bbb4e4ea39bb8100b6b35eb2021-10-01T00:00:00Zhttps://www.mdpi.com/1424-8220/21/21/7227https://doaj.org/toc/1424-8220The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.Chandrashekhar MeshramAgbotiname Lucky ImoizeAmer AljaediAdel R. AlharbiSajjad Shaukat JamalSharad Kumar BarveMDPI AGarticlepublic key cryptographyidentity-based encryption schemesChebyshev polynomialconformable Chebyshev chaotic mapshuman-centered Internet of ThingsChemical technologyTP1-1185ENSensors, Vol 21, Iss 7227, p 7227 (2021)
institution DOAJ
collection DOAJ
language EN
topic public key cryptography
identity-based encryption schemes
Chebyshev polynomial
conformable Chebyshev chaotic maps
human-centered Internet of Things
Chemical technology
TP1-1185
spellingShingle public key cryptography
identity-based encryption schemes
Chebyshev polynomial
conformable Chebyshev chaotic maps
human-centered Internet of Things
Chemical technology
TP1-1185
Chandrashekhar Meshram
Agbotiname Lucky Imoize
Amer Aljaedi
Adel R. Alharbi
Sajjad Shaukat Jamal
Sharad Kumar Barve
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
description The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.
format article
author Chandrashekhar Meshram
Agbotiname Lucky Imoize
Amer Aljaedi
Adel R. Alharbi
Sajjad Shaukat Jamal
Sharad Kumar Barve
author_facet Chandrashekhar Meshram
Agbotiname Lucky Imoize
Amer Aljaedi
Adel R. Alharbi
Sajjad Shaukat Jamal
Sharad Kumar Barve
author_sort Chandrashekhar Meshram
title A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
title_short A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
title_full A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
title_fullStr A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
title_full_unstemmed A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
title_sort provably secure ibe transformation model for pkc using conformable chebyshev chaotic maps under human-centered iot environments
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/ccb0f7923bbb4e4ea39bb8100b6b35eb
work_keys_str_mv AT chandrashekharmeshram aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT agbotinameluckyimoize aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT ameraljaedi aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT adelralharbi aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT sajjadshaukatjamal aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT sharadkumarbarve aprovablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT chandrashekharmeshram provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT agbotinameluckyimoize provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT ameraljaedi provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT adelralharbi provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT sajjadshaukatjamal provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
AT sharadkumarbarve provablysecureibetransformationmodelforpkcusingconformablechebyshevchaoticmapsunderhumancenterediotenvironments
_version_ 1718431611274395648