On the Suitability of Post-Quantum Signature Schemes for Internet of Things

被引:4
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Natl Inst Math Sci, Div Basic Res Ind Math, Daejeon 34047, South Korea
关键词
Internet of Things; Security; Performance evaluation; Cryptography; Program processors; NIST; Standards; Energy consumption; fault attack; implementation attack; post-quantum signature (PQS); public-key (PK) signature scheme; side-channel attack (SCA); LATTICE; CRYPTOSYSTEM;
D O I
10.1109/JIOT.2023.3327400
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key cryptography (PKC) provides confidentiality, data integrity, and user authentication. Particularly, nonrepudiation, authentication and integrity of transmitted messages are assured by public-key (PK) signature schemes. Since the presence of a large scale quantum computer would be a real threat to break currently used PK cryptographic algorithms, all security protocols based on the PK cryptographic algorithms are vulnerable to quantum-computer attacks. It needs to investigate possible alternatives, post-quantum cryptography (PQC), believed to be resistant to attacks from both classical and quantum computers. All the traditional PKC should be replaced with PQC for secure communications in post-quantum era. In this work, we evaluate the post-quantum signature schemes in terms of various metrics, performance, signature/key sizes, energy consumption, resistance to implementation attacks and adaptability to Internet protocols. We then investigate their suitability for Internet of Things based on these metrics.
引用
收藏
页码:10648 / 10665
页数:18
相关论文
共 50 条
  • [31] You Shall Not Pass! (Once Again) An IoT Application of Post-Quantum Stateful Signature Schemes
    Bellini, Emanuele
    Caullery, Florian
    Hasikos, Alexandros
    Manzano, Marc
    Mateu, Victor
    APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, : 19 - 24
  • [32] Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    Grossschadl, Johann
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 158 - 162
  • [33] From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things
    Fernandez-Carames, Tiago M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6457 - 6480
  • [34] High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3275 - 3288
  • [35] An Efficient Post-quantum Identity-Based Signature
    YANG Zhichao
    DUNG H.Duong
    WILLY Susilo
    YANG Guomin
    LI Chao
    CHEN Rongmao
    Chinese Journal of Electronics, 2021, 30 (02) : 238 - 248
  • [36] Efficient GPU Implementations of Post-Quantum Signature XMSS
    Wang, Ziheng
    Dong, Xiaoshe
    Chen, Heng
    Kang, Yan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (03) : 938 - 954
  • [37] An Efficient Post-quantum Identity-Based Signature
    Zhichao, Yang
    Duong, Dung H.
    Susilo, Willy
    Guomin, Yang
    Chao, Li
    Rongmao, Chen
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 238 - 248
  • [38] Hypericum: a post-quantum digital signature for standardization in Russia
    Turchenko, Oleg
    Grebnev, Sergey
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 455 - 483
  • [39] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [40] ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes
    Mondal, Puja
    Adhikary, Supriya
    Kundu, Suparna
    Karmakar, Angshuman
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VIII, 2025, 15491 : 132 - 167