We propose a novel solution to streamline the migration of existing Transport Layer Security (TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for Transport Layer Security (KEMTLS). By leveraging Identity-Based Encryption (IBE), our solution minimizes the necessary modifications to the surrounding infrastructure, enabling the reuse of existing keys and certificates. We provide a proof-of-concept implementation and performance analysis, demonstrating the practical feasibility and effectiveness of our proposed approach.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11598554 | PMC |
http://dx.doi.org/10.3390/s24227300 | DOI Listing |
Sensors (Basel)
November 2024
Graduate Program on Computer Science, Department of Informatics and Statistics, Federal University of Santa Catarina (UFSC), Florianópolis 88040-370, SC, Brazil.
We propose a novel solution to streamline the migration of existing Transport Layer Security (TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for Transport Layer Security (KEMTLS). By leveraging Identity-Based Encryption (IBE), our solution minimizes the necessary modifications to the surrounding infrastructure, enabling the reuse of existing keys and certificates. We provide a proof-of-concept implementation and performance analysis, demonstrating the practical feasibility and effectiveness of our proposed approach.
View Article and Find Full Text PDFSci Rep
November 2024
Electrical Engineering Department, Bahauddin Zakariya University Multan, Multan, Pakistan.
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs). In existing certificateless anonymous signcryption schemes for VANETs, vulnerabilities such as potential attacks involving the substitution of pseudonyms and the forging of pseudonymous public-private key pairs exist due to the lack of "identity-key binding" and "non-linearity processing of public-private key pairs." To address this issue, we propose an improved certificateless anonymous signcryption scheme based on elliptic curve cryptography.
View Article and Find Full Text PDFSensors (Basel)
August 2024
Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Ishikawa, Japan.
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT's unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission.
View Article and Find Full Text PDFSci Rep
March 2024
School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China.
With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing.
View Article and Find Full Text PDFSensors (Basel)
February 2024
Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Japan.
Ensuring authorized access control in the IoT is vital for privacy and safety protection. Our study presents the novel IHIBE framework, which combines IOTA (a distributed ledger technology) with hierarchical identity-based encryption (HIBE), thereby enhancing both IoT security and scalability. This approach secures access tokens and policies while reducing the computational demand on data owners.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!