Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks

被引:3
|
作者
Zhang, Yang [1 ]
Tang, Yu [2 ]
Li, Chaoyang [2 ]
Zhang, Hua [1 ]
Ahmad, Haseeb [3 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Food & Bioengn, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Univ Light Ind, Coll Software Engn, Zhengzhou 450001, Peoples R China
[3] Natl Text Univ, Dept Comp Sci, Faisalabad 37610, Pakistan
基金
中国国家自然科学基金;
关键词
Internet of Things; identity-based signature; post-quantum; lattice cryptography; INDUSTRIAL INTERNET; CHALLENGES; BLOCKCHAIN;
D O I
10.3390/s24134188
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) plays an essential role in people's daily lives, such as healthcare, home, traffic, industry, and so on. With the increase in IoT devices, there emerge many security issues of data loss, privacy leakage, and information temper in IoT network applications. Even with the development of quantum computing, most current information systems are weak to quantum attacks with traditional cryptographic algorithms. This paper first establishes a general security model for these IoT network applications, which comprises the blockchain and a post-quantum secure identity-based signature (PQ-IDS) scheme. This model divides these IoT networks into three layers: perceptual, network, and application, which can protect data security and user privacy in the whole data-sharing process. The proposed PQ-IDS scheme is based on lattice cryptography. Bimodal Gaussian distribution and the discrete Gaussian sample algorithm are applied to construct the fundamental difficulty problem of lattice assumption. This assumption can help resist the quantum attack for information exchange among IoT devices. Meanwhile, the signature mechanism with IoT devices' identity can guarantee non-repudiation of information signatures. Then, the security proof shows that the proposed PQ-IDS can obtain the security properties of unforgeability, non-repudiation, and non-transferability. The efficiency comparisons and performance evaluations show that the proposed PQ-IDS has good efficiency and practice in IoT network applications.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Identity-based quantum signature scheme with strong security
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    OPTICAL AND QUANTUM ELECTRONICS, 2019, 51 (12)
  • [42] Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
    Dharminder, Dharminder
    Das, Ashok Kumar
    Saha, Sourav
    Bera, Basudeb
    Vasilakos, Athanasios V.
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [43] An improved efficient identity-based quantum signature scheme
    Yongfei Huang
    Guangxia Xu
    Xiaoling Song
    Quantum Information Processing, 22
  • [44] A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
    Gao, Yu-Long
    Chen, Xiu-Bo
    Chen, Yu-Ling
    Sun, Ying
    Niu, Xin-Xin
    Yang, Yi-Xian
    IEEE ACCESS, 2018, 6 : 27205 - 27213
  • [45] An Efficient Post-quantum Multi-signature Scheme for the Internet of Vehicles
    Zhang, Qianyi
    Yuan, Shuai
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2504 - 2509
  • [46] Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model
    Santoso, Bagus
    Su, Chunhua
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 271 - 284
  • [47] The Post-quantum Probabilistic Signature Scheme
    Mbaye, Mouhamed Lamine
    Sow, Demba
    Sow, Djiby
    INFORMATICS AND INTELLIGENT APPLICATIONS, 2022, 1547 : 107 - 120
  • [48] A practical study of post-quantum enhanced identity-based encryption
    Verchyk, Dariia
    Sepulveda, Johanna
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 99
  • [49] Efficient Post-quantum Identity-based Encryption with Equality Test
    Susilo, Willy
    Dung Hoang Duong
    Huy Quoc Le
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 633 - 640
  • [50] Identity-Based Linearly Homomorphic Signature Scheme from Lattice
    Wang, Shang-Ping
    Di, Wei-Biao
    Deng, Yin-Juan
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 149 - 154