Have a personal or library account? Click to login
Enhanced cryptographic performance and security using optimized edward-elgamal signature scheme for IoT and blockchain applications Cover

Enhanced cryptographic performance and security using optimized edward-elgamal signature scheme for IoT and blockchain applications

Open Access
|Nov 2024

References

  1. Akhbarifar, S., Javadi, H.H.S., Rahmani, A.M., Hosseinzadeh, M. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput. 2023, 27, 697–713.
  2. Medileh, S., Laouid, A., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., Khashan, O.A. A flexible encryption technique for the internet of things environment. Ad. Hoc. Netw. 2020, 106, 102240.
  3. Fuchsbauer, G., Plouviez, A., Seurin, Y. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Cham, Switzerland, 2020; pp. 63–95.
  4. Zheng, R., Jia, H., Abualigah, L., Liu, Q., Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2020.
  5. Krichen, M., Mihoub, A., Alzahrani, M.Y., Adoni, W.Y.H., Nahhal, T. Are Formal Methods Applicable to Machine Learning And Artificial Intelligence? In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 9–11 May 2022; pp. 48–53.
  6. Raman, R., Gupta, N., Jeppu, Y. Framework for Formal Verification of Machine Learning Based Complex System-of-Systems. Insight 2023, 26, 91–102.
  7. G.S. Reddy, S. Radha, K.T. Taufiq, K.D.S. Reddy, K.P.K. Reddy, P. Nagabushanam. Security based Electronic Voting Machine using Xilinx tool. 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (2022), pp. 1–4, 10.1109/PARC52418.2022.9726556
  8. V. Bhatt, A.K. Bindal. Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) (2021), pp. 262–265, 10.1109/ISPCC53510.2021.9609399
  9. X. Xu, H. Zhao, H. Yao, S. Wang. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet of Things Journal, 8 (4) (2021), pp. 2431–2443, 10.1109/JIOT.2020.3030080
  10. S. Pothumani, A. Arunachalam. Effective Security Mechanisms for Big Data Using Block Chain Technology 2021 International Conference on Computer Communication and Informatics (ICCCI) (2021), pp. 1–6, 10.1109/ICCCI50826.2021.9402458
  11. R. Shrivastava, A. Tiwary, P. Yadav. Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review 2021 International Conference on Advances in Technology, Management & Education (ICATME) (2021), pp. 238–243, 10.1109/ICATME50232.2021.9732730
  12. Reddy, G. S., Radha, S., Taufiq, K. T., Reddy, K. D. S., Reddy, K. P. K., & Nagabushanam, P. (2022). Security based electronic voting machine using Xilinx tool. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (pp. 1–4). IEEE. https://doi.org/10.1109/PARC52418.2022.9726556
  13. Devibala, A. (2019). A survey on security issues in IoT for blockchain healthcare. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (pp. 1–7). IEEE. https://doi.org/10.1109/ICECCT.2019.8869253
  14. Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N., & Ghosh, A. (2021). Blockchain-based model for expanding IoT device data security. In J. C. Bansal, L. C. C. Fung, M. Simic, & A. Ghosh (Eds.), Advances in Applications of Data-Driven Computing (Vol. 1319). Springer, Singapore. https://doi.org/10.1007/978-981-33-6919-1_5
  15. Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. Falcon. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 31–41.
  16. Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. SPHINCS + . In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 141–162.
  17. Zhang, J., Chen, Y., Zhang, Z. Lattice-Based Programmable Hash Functions and Applications. J. Cryptol. 2024, 37, 4.
  18. Mehrabi M.A. and Doche C., “Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,” 2019. https://doi.org/10.3390/info10090285
  19. Faz-Hernandez A., Lopez J., and Dahab R., “High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,” ACM Transactions on Mathematical Software, vol. 45, no. 3, pp. 1–35, 2019. https://doi.org/10.1145/3309759
  20. Hu Z., Gnatyuk S., Kovtun M., and Seilova N., “Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,” Advances in Intelligent Systems and Computing, pp. 309–319, 2018. https://doi.org/10.1007/978-3-319-91008-6_31
  21. Islam M.M., Hossain M.S., Hasan M.K., Shahjalal M., and Jang Y.M., “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019. https://doi.org/10.1109/access.2019.2958491
  22. Franck C. and Grosschadl J., “Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,” Mobile, Secure, and Programmable Networking, pp. 1–17, 2017. https://doi.org/10.1007/978-3-319-67807-8_1
  23. Liu Z., Grosschadl J., Hu Z., Jarvinen K., Wang H., and Verbauwhede I., “Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 773–785, 2017. https://doi.org/10.1109/tc.2016.2623609
  24. Liu Z., Weng J., Hu Z., and Seo H., “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 2, pp. 1–18, 2017. https://doi.org/10.1145/2967103
  25. Naresh V.S., Reddi S., and Allavarpu V.D., “Blockchain-based patient centric health care communication system,” International Journal of Communication Systems, vol. 34, no. 7, pp. 34–34, 2021. https://doi.org/10.1002/dac.4749
  26. Saini A., Zhu Q., Singh N., Xiang Y., Gao L., and Zhang Y., “A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,” IEEE IoT Journal, vol. 8, no. 7, pp. 5914–5925, 2021. https://doi.org/10.1109/jiot.2020.3032997
  27. Jasem F.M., Sagheer A.M., and Awad A.M., “Enhancement of digital signature algorithm in bitcoin wallet,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 1, pp. 449–457, 2021. https://doi.org/10.11591/eei.v10i1.2339
  28. Sadiq A., Javed M.U., Khalid R., Almogren A., Shafiq M., and Javaid N., “Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,” IEEE Access, vol. 9, pp. 7000–7020, 2021. https://doi.org/10.1109/access.2020.3048169
  29. Arulprakash M. and Jebakumar R., “Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,” The Journal of Supercomputing, 2021. https://doi.org/10.1007/s11227-021-03756-x
  30. Kavin BP, Ganapathy S., Kanimozhi U., and Kannan A., “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” 2020. https://doi.org/10.1007/s11277-020-07613-7
  31. Benil T. and Jasper J., “Cloud-based security on outsourcing using blockchain in E-health systems Computer Networks, vol. 178, pp. 107344–107344, 2020. https://doi.org/10.1016/j.comnet.2020.107344
  32. Wang H., He D., and Ji Y., “Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, “Future Generation Computer Systems, vol. 107, pp. 854–862, 2020. https://doi.org/10.1016/j.future.2017.06.028
  33. Kumar M., Chand S., and Katti C.P., “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal, vol. 14, no. 2, pp. 2032–2041, 2020. https://doi.org/10.1109/jsyst.2019.2940474
  34. Li X., Mei Y., Gong J., Xiang F., and Sun Z., “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020. https://doi.org/10.1109/access.2020.2987831
  35. Ernest B. and Shiguang J., “Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,” IEEE Access, vol. 8, pp. 25863–25876, 2020. https://doi.org/10.1109/access.2020.2968621
  36. Zhang X., Zhou Z., Zhang J., Xu C., and Zhang X., “Efficient lightweight private auditing scheme for cloud-based wireless body area networks,” International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 139–139, 2020. https://doi.org/10.1504/ijesdf.2020.10027592
  37. Ansah AKK and Gyamfi D.A., “Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,” International Journal of Computational Science and Engineering, vol. 23, no. 4, 2020. https://doi.org/10.1504/ijcse.2020.10035561
  38. Chen C.L., Deng Y.Y., Weng W., Chen C.H., Chiu Y.J., and Wu C.M., “A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,” Electronics, vol. 9, no. 1, 2020. https://doi.org/10.3390/electronics9010062
  39. Ullah I., Amin N.U., Almogren A., Khan M.A., Uddin M.I., and Hua Q., “A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,” IEEE Access, vol. 8, pp. 199197–199212, 2020. https://doi.org/10.1109/access.2020.3033758
  40. Zhang X., Zhao J., Mu L., Tang Y., and Xu C., “Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,” Pervasive and Mobile Computing, vol. 56, pp. 18–28, 2019. https://doi.org/10.1016/j.pmcj.2019.03.004
  41. Taleb N., “Prospective applications of blockchain and bitcoin cryptocurrency technology,” TEM Journal, vol. 8, no. 03, pp. 48–55, 2019. https://dx.doi.org/10.18421/TEM81-06
  42. Gousteris, S., Stamatiou, Y. C., Halkiopoulos, C., Antonopoulou, H., & Kostopoulos, N. (2023). Secure distributed cloud storage based on blockchain technology and smart contracts. Emerging Science Journal, 7(2).
  43. Singh, S., Rosak-Szyrocka, J., & Tamàndl, L. (2023). Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applications. HighTech and Innovation Journal, 4(1).
  44. Ruangkanjanases, A., Hariguna, T., Adiandari, A. M., & Alfawaz, K. M. (2022). Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading need. Emerging Science Journal, 6(5).
  45. Lee, G. Kim, K & Kim, S. (2020). A Study on the Application of Blockchain Technology in the Construction Industry. KSCE J Civ Eng 24, 2561–2571.
Language: English
Submitted on: Jul 13, 2023
Published on: Nov 10, 2024
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 S. Kavitha, J. Srinivasan, P. Ramachandran, I. Nasurulla, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.