Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks

被引:3
|
作者
Zhang, Yang [1 ]
Tang, Yu [2 ]
Li, Chaoyang [2 ]
Zhang, Hua [1 ]
Ahmad, Haseeb [3 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Food & Bioengn, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Univ Light Ind, Coll Software Engn, Zhengzhou 450001, Peoples R China
[3] Natl Text Univ, Dept Comp Sci, Faisalabad 37610, Pakistan
基金
中国国家自然科学基金;
关键词
Internet of Things; identity-based signature; post-quantum; lattice cryptography; INDUSTRIAL INTERNET; CHALLENGES; BLOCKCHAIN;
D O I
10.3390/s24134188
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) plays an essential role in people's daily lives, such as healthcare, home, traffic, industry, and so on. With the increase in IoT devices, there emerge many security issues of data loss, privacy leakage, and information temper in IoT network applications. Even with the development of quantum computing, most current information systems are weak to quantum attacks with traditional cryptographic algorithms. This paper first establishes a general security model for these IoT network applications, which comprises the blockchain and a post-quantum secure identity-based signature (PQ-IDS) scheme. This model divides these IoT networks into three layers: perceptual, network, and application, which can protect data security and user privacy in the whole data-sharing process. The proposed PQ-IDS scheme is based on lattice cryptography. Bimodal Gaussian distribution and the discrete Gaussian sample algorithm are applied to construct the fundamental difficulty problem of lattice assumption. This assumption can help resist the quantum attack for information exchange among IoT devices. Meanwhile, the signature mechanism with IoT devices' identity can guarantee non-repudiation of information signatures. Then, the security proof shows that the proposed PQ-IDS can obtain the security properties of unforgeability, non-repudiation, and non-transferability. The efficiency comparisons and performance evaluations show that the proposed PQ-IDS has good efficiency and practice in IoT network applications.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [32] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Lunzhi Deng
    Xiuru He
    Tian Xia
    Wireless Personal Communications, 2021, 116 : 1525 - 1537
  • [33] A Tightly Secure Identity-Based Signature Scheme from Isogenies
    Chen, Jiawei
    Jo, Hyungrok
    Sato, Shingo
    Shikata, Junji
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 141 - 163
  • [34] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [35] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [36] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [37] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Deng, Lunzhi
    He, Xiuru
    Xia, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1525 - 1537
  • [38] Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms
    Asif, Rameez
    IOT, 2021, 2 (01): : 71 - 91
  • [39] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Optical and Quantum Electronics, 2019, 51
  • [40] An improved efficient identity-based quantum signature scheme
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    QUANTUM INFORMATION PROCESSING, 2022, 22 (01)