Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 980274, 9 pages
http://dx.doi.org/10.1155/2014/980274
Research Article

Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things

1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2Department of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062, China

Received 9 October 2013; Revised 31 December 2013; Accepted 19 January 2014; Published 12 March 2014

Academic Editor: Fuzhong Nian

Copyright © 2014 Rui Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advancesin Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, 1984. View at Google Scholar
  2. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '03), C. S. Laih, Ed., vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, 2003.
  3. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  4. Z. Cheng and R. Comley, “Efficient certificateless public key encryption,” Tech. Rep. 2005/012, Cryptology ePrint Archive, 2005. View at Google Scholar
  5. Y. Shi and J. Li, “Provable efficient certificateless public key encryption,” Tech. Rep. 2005/287, Cryptology ePrint Archive, 2005. View at Google Scholar
  6. A. W. Dent, B. Libert, and K. G. Paterson, “Certificateless encryption schemesstrongly secure in the standard model,” in Proceedings of the International Workshop on Practice and Theory in Public-Key Cryptography (PKC ’08), vol. 4939 of Lecture Notes inComputer Science, pp. 344–359, Springer, 2008.
  7. Y. X. Sun and H. Li, “Short-ciphertext and BDH-based CCA2 secure certificateless encryption,” Science in China F, vol. 53, no. 10, pp. 2005–2015, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. International Telecommunication Union, ITU Internet Reports 2005: the Internet of Things, 2005.
  9. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  10. R. H. Weber, “Internet of Things—new security and privacy challenges,” Computer Law and Security Review, vol. 26, no. 1, pp. 23–30, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. R. Roman, P. Najera, and J. Lopez, “Securing the Internet of things,” Computer, vol. 44, no. 9, Article ID 6017172, pp. 51–58, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Guillevic, “Comparing the pairing efficiency over composite-order and primeorderelliptic curves,” in Proceedings of the Applied Cryptography and Network Security (ACNS ’13), vol. 7954 of Lecture Notes in Computer Science, pp. 357–372, Springer, 2013.
  13. L. C. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2nd edition, 2008.
  14. K. Koyama, U. Maurer, T. Okamoto, and S. Vanstone, “New public-key schemesbased on elliptic curves over the ring Zn,” in Advances in Cryptology, vol. 576 of Lecture Notes in Computer Science, pp. 252–266, Springer, 1992. View at Google Scholar
  15. W. Bosma and H. W. Lenstra, “Complete systems of two addition laws for elliptic curves,” Journal of Number Theory, vol. 53, no. 2, pp. 229–240, 1995. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  16. X. Xiong, D. S. Wong, and X. Deng, “TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '10), pp. 1–6, April 2010. View at Publisher · View at Google Scholar · View at Scopus