Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture

被引:1
作者
Debnath, Sumit Kumar [1 ]
Mesnager, Sihem [2 ,3 ,4 ]
Srivastava, Vikas [1 ]
Pal, Saibal Kumar [5 ]
Kundu, Nibedita [6 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, India
[2] Univ Paris VIII, Dept Math, F-93526 St Denis, France
[3] CNRS, LAGA, UMR 7539, F-93430 Villetaneuse, France
[4] Univ Sorbonne Paris Cite, Telecom Paris, F-91120 Palaiseau, France
[5] Def Res & Dev Org, SAG Lab, New Delhi 110054, India
[6] LNM Inst Informat Technol, Dept Math, Jaipur 302031, India
关键词
Multivariate public key cryptography; Post-quantum cryptography; Identity based signature; IoT; NDN; SECURE; IDENTIFICATION;
D O I
10.1007/s13389-022-00308-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has been forty years since the TCP/IP protocol blueprint, which is the core of the modern worldwide Internet, was published. Over this long period, technology has made rapid progress. These advancements are slowly putting pressure and new demands on the underlying network architecture design. Therefore, there was a need for innovations that could handle the increasing demands of new technologies like IoT while ensuring secrecy and privacy. It is how named data networking (NDN) came into the picture. NDN enables robust data distribution with interest-based content retrieval and a leave-copy-everywhere caching policy. Even though NDN has surfaced as a future envisioned and decisive machinery for data distribution in IoT, it suffers from new data security challenges like content poisoning attacks. In this attack, an attacker attempts to introduce poisoned content with an invalid signature into the network. Given the circumstances, there is a need for a cost-effective signature scheme, requiring inexpensive computing resources and fast when implemented. An identity-based signature scheme (IBS) is the natural choice to address this problem. Herein, we present an IBS, namely Mul-IBS relying on multivariate public key cryptography (MPKC), which leads the race among the post-quantum cryptography contenders. A 5-pass identification scheme accompanying a safe and secure signature scheme based on MPKC works as key ingredients of our design. Our Mul-IBS attains optimal master public key size, master secret key size, and user's secret key size in the context of multivariate identity-based signatures. The proposed scheme Mul-IBS is proven to be secure in the model, existential unforgeability under chosen-message and chosen identity attack (uf-cma), contingent upon the fact that Multivariate Quadratic (MQ) problem is NP-hard. The proposed design Mul-IBS can be utilized as a crucial cryptographic building block to build a robust and resilient IoT-based NDN architecture.
引用
收藏
页码:187 / 199
页数:13
相关论文
共 30 条
[1]  
[Anonymous], 2009, Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, DOI [DOI 10.1145/1658939.1658941, 10.1145/1658939.1658941]
[2]  
[Anonymous], 2013, THESIS
[3]  
Bernstein D. J., 2009, Post-Quantum Cryptography, P1, DOI DOI 10.1007/978-3-540-88702-7
[4]   Breaking Rainbow Takes a Weekend on a Laptop [J].
Beullens, Ward .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 :464-479
[5]  
Bogdauov A, 2008, LECT NOTES COMPUT SC, V5154, P45
[6]  
Chen AIT, 2009, LECT NOTES COMPUT SC, V5747, P33
[7]   Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems [J].
Chen, Jiahui ;
Ling, Jie ;
Ning, Jianting ;
Ding, Jintai .
COMPUTER JOURNAL, 2019, 62 (08) :1132-1147
[8]   From 5-Pass MQ-Based Identification to MQ-Based Signatures [J].
Chen, Ming-Shing ;
Hulsing, Andreas ;
Rijneveld, Joost ;
Samardjiska, Simona ;
Schwabe, Peter .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :135-165
[9]  
Ding J., 2020, MULTIVARIATE PUBLIC, V80
[10]  
Ding JT, 2005, LECT NOTES COMPUT SC, V3531, P164