Subversion resistant identity-based signature

被引:0
作者
Ouyang, Mengdi [1 ]
Yang, Cuixiang [1 ]
Liao, Xiaojuan [2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Technol, Chengdu 611731, Sichuan, Peoples R China
[2] Chengdu Univ Technol, Sichuan Engn Technol Res Ctr Ind Internet Intellig, Chengdu 610059, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity-based signature; Subversion attack; Cryptpographic reverse firewall; SCHEME;
D O I
10.1016/j.sysarc.2025.103385
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography (IBC) resolves the issue of certificate management, establishing itself as an evolving industry standard. Identity-based signature (IBS), an essential element of IBC, ensures integrity and authentication, playing a crucial role in the domains of internet of things (IoT) and cloud computing. Nevertheless, the "Snowden" event exposed how attackers subverted cryptographic algorithms' implementations to undermine security and conduct mass-surveillance. We explore a subversion attack (SA) model on IBS and define two properties including undetectability and strong key recoverability. Our SA enables a recovery of the master private key and a private key through any two successive signatures, posing a greater challenge. Cryptographic reverse firewalls (RFs) are the main countermeasures to resist SAs. However, existing works necessitate the storage of randomness corresponding to various identities and fail to resist bit-by-bit SA. To address the aforementioned issue, we formulate a system model and a security model for subversion-resistant identity-based signature (SR-IBS). Then, we establish an instance and prove SR-IBS's security of existential unforgeability under chosen message attack (EUF-CMA) along with subversion resistance. Finally, we leverage pypbc library to conduct a comprehensive experiment analysis. The results indicate the execution difference between subverted IBS and pure one is around 2ms and RFs only add approximately 0.5% of overall execution across five different security level. SR-IBS provides subversion-resistant without increasing high computation burden.
引用
收藏
页数:11
相关论文
共 44 条
[21]  
Jae Choon Cha, 2002, Public Key Cryptography - PKC 2003. 6th International Workshop on Practice and Theory in Public Key Cryptography. Proceedings (Lecture Notes in Computer Science Vol.2567), P18
[22]   Blockchain-Based Signature Scheme with Cryptographic Reverse Firewalls for IoV [J].
Jin, Chunhua ;
Zhou, Wenwen ;
Li, Lulu ;
Liu, Chang ;
Chen, Xiaobing .
FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 :82-95
[23]  
Kang Burong, 2023, Algorithms and Architectures for Parallel Processing: 22nd International Conference, ICA3PP 2022, Proceedings. Lecture Notes in Computer Science (13777), P192, DOI 10.1007/978-3-031-22677-9_11
[24]   Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse [J].
Li, Ruoxia ;
Wang, Zengxiang ;
Fang, Liming ;
Peng, Changgen ;
Wang, Weizheng ;
Xiong, Hu .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :3770-3780
[25]   A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens [J].
Li, Shanshan ;
Xu, Chunxiang ;
Zhang, Yuan ;
Zhou, Jianying .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3525-3538
[26]   Asymmetric Subversion Attacks on Signature Schemes [J].
Liu, Chi ;
Chen, Rongmao ;
Wang, Yi ;
Wang, Yongjun .
INFORMATION SECURITY AND PRIVACY, 2018, 10946 :376-395
[27]   IdenMultiSig: Identity-Based Decentralized Multi-Signature in Internet of Things [J].
Liu, Han ;
Han, Dezhi ;
Cui, Mingming ;
Li, Kuan-Ching ;
Souri, Alireza ;
Shojafar, Mohammad .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04) :1711-1721
[28]   Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls Secure and Efficient Fine-Grained Access Control on Corrupted Machines [J].
Ma, Hui ;
Zhang, Rui ;
Yang, Guomin ;
Song, Zishuai ;
Sun, Shuzhou ;
Xiao, Yuting .
COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 :507-526
[29]   Cryptographic Reverse Firewalls [J].
Mironov, Ilya ;
Stephens-Davidowitz, Noah .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :657-686
[30]   Digital signature with cryptographic reverse firewalls [J].
Ouyang, Mengdi ;
Wang, Ziqing ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116 (116)