An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems. Shi, Y., Han, J., Wang, X., Gao, J., & Fan, H. IEEE Internet of Things Journal, 4(4):1067-1081, IEEE, 8, 2017. Website abstract bibtex Signcryption is a cryptographic technique for simultaneously performing both digital signature and data encryption. It is effective for protecting the confidentiality and unforgeability of communications in Internet of Things (IoT) systems, especially when a number of generated ciphertexts can be aggregated into a compact form. However, device capture attacks are commonly threatening the implementations of signcryption on unattended devices by enabling an attacker to extract the cryptographic key from a captured device. Motivated by this issue, we propose a novel and specialized obfuscatable aggregatable signcryption scheme (OASC) together with an obfuscator for the signcryption algorithm, which has been designed by taking into account that the computational and communication costs should be sufficiently small (light-weighted) to fit applications in resource-constrained embedded devices. The proposed obfuscator can protect signcryption programs from key-extraction attacks by transforming the programs into unintelligible obfuscated programs. To the best of our knowledge, this is the first OASC in the community. The scheme's security features with respect to obfuscation, confidentiality, and unforgeability have been theoretically proved. Moreover, in comparison with other (nonobfuscatable) aggregatable signcryption schemes, the scheme's computational efficiency is positioned at a medium level while the communication cost is also relatively small, with extra unique security features benefiting from obfuscation. Experiments on different devices indicated that the proposed scheme performs reasonably well as expected. The scheme is widely applicable for various scenarios of IoT, where information is sent from unattended leaf nodes to a sink point.
@article{
title = {An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems},
type = {article},
year = {2017},
identifiers = {[object Object]},
keywords = {crypto,iot,iotsec},
pages = {1067-1081},
volume = {4},
websites = {http://dx.doi.org/10.1109/jiot.2017.2677977},
month = {8},
publisher = {IEEE},
id = {94314d31-86a7-3b4f-b18c-083883103099},
created = {2018-07-12T21:32:16.786Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:16.786Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {shi:signcryption},
source_type = {article},
notes = {Signcryption is a cryptographic technique that combines signatures and encryption. Obfuscatable methods use code obfuscation to hide the secrets used in encryption. This paper's point is that embedded systems that are unattended may be subject to physical capture and thus physical extraction of the keys that those devices might use for signcryption, so they develop a new signcyrption method that obfuscatable and efficient enough for embedded devices.},
private_publication = {false},
abstract = {Signcryption is a cryptographic technique for simultaneously performing both digital signature and data encryption. It is effective for protecting the confidentiality and unforgeability of communications in Internet of Things (IoT) systems, especially when a number of generated ciphertexts can be aggregated into a compact form. However, device capture attacks are commonly threatening the implementations of signcryption on unattended devices by enabling an attacker to extract the cryptographic key from a captured device. Motivated by this issue, we propose a novel and specialized obfuscatable aggregatable signcryption scheme (OASC) together with an obfuscator for the signcryption algorithm, which has been designed by taking into account that the computational and communication costs should be sufficiently small (light-weighted) to fit applications in resource-constrained embedded devices. The proposed obfuscator can protect signcryption programs from key-extraction attacks by transforming the programs into unintelligible obfuscated programs. To the best of our knowledge, this is the first OASC in the community. The scheme's security features with respect to obfuscation, confidentiality, and unforgeability have been theoretically proved. Moreover, in comparison with other (nonobfuscatable) aggregatable signcryption schemes, the scheme's computational efficiency is positioned at a medium level while the communication cost is also relatively small, with extra unique security features benefiting from obfuscation. Experiments on different devices indicated that the proposed scheme performs reasonably well as expected. The scheme is widely applicable for various scenarios of IoT, where information is sent from unattended leaf nodes to a sink point.},
bibtype = {article},
author = {Shi, Yang and Han, Jingxuan and Wang, Xiaoping and Gao, Jiayao and Fan, Hongfei},
journal = {IEEE Internet of Things Journal},
number = {4}
}
Downloads: 0
{"_id":"JRLwoL3YukAJCWek5","bibbaseid":"shi-han-wang-gao-fan-anobfuscatableaggregatablesigncryptionschemeforunattendeddevicesiniotsystems-2017","downloads":0,"creationDate":"2019-02-15T15:15:01.158Z","title":"An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems","author_short":["Shi, Y.","Han, J.","Wang, X.","Gao, J.","Fan, H."],"year":2017,"bibtype":"article","biburl":null,"bibdata":{"title":"An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems","type":"article","year":"2017","identifiers":"[object Object]","keywords":"crypto,iot,iotsec","pages":"1067-1081","volume":"4","websites":"http://dx.doi.org/10.1109/jiot.2017.2677977","month":"8","publisher":"IEEE","id":"94314d31-86a7-3b4f-b18c-083883103099","created":"2018-07-12T21:32:16.786Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:16.786Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"shi:signcryption","source_type":"article","notes":"Signcryption is a cryptographic technique that combines signatures and encryption. Obfuscatable methods use code obfuscation to hide the secrets used in encryption. This paper's point is that embedded systems that are unattended may be subject to physical capture and thus physical extraction of the keys that those devices might use for signcryption, so they develop a new signcyrption method that obfuscatable and efficient enough for embedded devices.","private_publication":false,"abstract":"Signcryption is a cryptographic technique for simultaneously performing both digital signature and data encryption. It is effective for protecting the confidentiality and unforgeability of communications in Internet of Things (IoT) systems, especially when a number of generated ciphertexts can be aggregated into a compact form. However, device capture attacks are commonly threatening the implementations of signcryption on unattended devices by enabling an attacker to extract the cryptographic key from a captured device. Motivated by this issue, we propose a novel and specialized obfuscatable aggregatable signcryption scheme (OASC) together with an obfuscator for the signcryption algorithm, which has been designed by taking into account that the computational and communication costs should be sufficiently small (light-weighted) to fit applications in resource-constrained embedded devices. The proposed obfuscator can protect signcryption programs from key-extraction attacks by transforming the programs into unintelligible obfuscated programs. To the best of our knowledge, this is the first OASC in the community. The scheme's security features with respect to obfuscation, confidentiality, and unforgeability have been theoretically proved. Moreover, in comparison with other (nonobfuscatable) aggregatable signcryption schemes, the scheme's computational efficiency is positioned at a medium level while the communication cost is also relatively small, with extra unique security features benefiting from obfuscation. Experiments on different devices indicated that the proposed scheme performs reasonably well as expected. The scheme is widely applicable for various scenarios of IoT, where information is sent from unattended leaf nodes to a sink point.","bibtype":"article","author":"Shi, Yang and Han, Jingxuan and Wang, Xiaoping and Gao, Jiayao and Fan, Hongfei","journal":"IEEE Internet of Things Journal","number":"4","bibtex":"@article{\n title = {An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems},\n type = {article},\n year = {2017},\n identifiers = {[object Object]},\n keywords = {crypto,iot,iotsec},\n pages = {1067-1081},\n volume = {4},\n websites = {http://dx.doi.org/10.1109/jiot.2017.2677977},\n month = {8},\n publisher = {IEEE},\n id = {94314d31-86a7-3b4f-b18c-083883103099},\n created = {2018-07-12T21:32:16.786Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:16.786Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {shi:signcryption},\n source_type = {article},\n notes = {Signcryption is a cryptographic technique that combines signatures and encryption. Obfuscatable methods use code obfuscation to hide the secrets used in encryption. This paper's point is that embedded systems that are unattended may be subject to physical capture and thus physical extraction of the keys that those devices might use for signcryption, so they develop a new signcyrption method that obfuscatable and efficient enough for embedded devices.},\n private_publication = {false},\n abstract = {Signcryption is a cryptographic technique for simultaneously performing both digital signature and data encryption. It is effective for protecting the confidentiality and unforgeability of communications in Internet of Things (IoT) systems, especially when a number of generated ciphertexts can be aggregated into a compact form. However, device capture attacks are commonly threatening the implementations of signcryption on unattended devices by enabling an attacker to extract the cryptographic key from a captured device. Motivated by this issue, we propose a novel and specialized obfuscatable aggregatable signcryption scheme (OASC) together with an obfuscator for the signcryption algorithm, which has been designed by taking into account that the computational and communication costs should be sufficiently small (light-weighted) to fit applications in resource-constrained embedded devices. The proposed obfuscator can protect signcryption programs from key-extraction attacks by transforming the programs into unintelligible obfuscated programs. To the best of our knowledge, this is the first OASC in the community. The scheme's security features with respect to obfuscation, confidentiality, and unforgeability have been theoretically proved. Moreover, in comparison with other (nonobfuscatable) aggregatable signcryption schemes, the scheme's computational efficiency is positioned at a medium level while the communication cost is also relatively small, with extra unique security features benefiting from obfuscation. Experiments on different devices indicated that the proposed scheme performs reasonably well as expected. The scheme is widely applicable for various scenarios of IoT, where information is sent from unattended leaf nodes to a sink point.},\n bibtype = {article},\n author = {Shi, Yang and Han, Jingxuan and Wang, Xiaoping and Gao, Jiayao and Fan, Hongfei},\n journal = {IEEE Internet of Things Journal},\n number = {4}\n}","author_short":["Shi, Y.","Han, J.","Wang, X.","Gao, J.","Fan, H."],"urls":{"Website":"http://dx.doi.org/10.1109/jiot.2017.2677977"},"bibbaseid":"shi-han-wang-gao-fan-anobfuscatableaggregatablesigncryptionschemeforunattendeddevicesiniotsystems-2017","role":"author","keyword":["crypto","iot","iotsec"],"downloads":0},"search_terms":["obfuscatable","aggregatable","signcryption","scheme","unattended","devices","iot","systems","shi","han","wang","gao","fan"],"keywords":["crypto","iot","iotsec"],"authorIDs":[]}