An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things

被引:9
作者
Shu, Hong [1 ,2 ,3 ]
Chen, Fulong [1 ,2 ]
Xie, Dong [1 ,2 ]
Sun, Liping [1 ,2 ]
Qi, Ping [3 ]
Huang, Yongqing [3 ,4 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Peoples R China
[3] Tongling Univ, Sch Math & Comp, Tongling 244061, Peoples R China
[4] Tongling Univ, Inst Informat Technol & Engn Management, Tongling 244061, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things (IoT); aggregate signature; trapdoor hash function; elliptic curve discrete logarithm; random oracle model;
D O I
10.3390/s19194239
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications. In order to solve the issues of bandwidth limitation and computational efficiency of secure communication in IoT applications, an aggregate signature scheme based on multi-trapdoor hash function is proposed in this paper. Firstly, to prevent key exposition, based on the elliptic curve discrete logarithm problem (ECDLP), we constructed a double trapdoor hash function (DTH) and proved its reliability. Secondly, the multi-trapdoor hash function (MTH) based on DTH is presented. Finally, an MTH-based aggregate signature scheme (MTH-AS) with constant signature length is proposed. Based on the assumption of ECDLP, the proposed scheme is proven unforgeable against adaptive chosen message attacks with the Forking Lemma. Different from the most signature schemes with bilinear mapping, the proposed scheme has higher computational efficiency and shorter aggregate signature length. Moreover, it is independent of the number of signers. Security analysis and performance evaluation has revealed that the proposed scheme is an ideal solution for secure IoT applications with limited computing power, storage capacity, or limited bandwidth, such as wireless sensor networks, vehicular ad hoc networks, or healthcare sensor networks.
引用
收藏
页数:21
相关论文
共 39 条
  • [1] Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
    Ahn, Jae Hyun
    Green, Matthew
    Hohenberger, Susan
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 473 - 484
  • [2] An Advanced Algorithm for Higher Network Navigation in Social Internet of Things Using Small-World Networks
    Amin, Farhan
    Abbasi, Rashid
    Rehman, Abdul
    Choi, Gyu Sang
    [J]. SENSORS, 2019, 19 (09)
  • [3] Amin F, 2018, TENCON IEEE REGION, P2086, DOI 10.1109/TENCON.2018.8650511
  • [4] Towards Trust and Friendliness Approaches in the Social Internet of Things
    Amin, Farhan
    Ahmad, Awais
    Choi, Gyu Sang
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [5] [Anonymous], 2015, P 2014 4 INT C WIR M, DOI DOI 10.1109/MOBIHEALTH.2014.7015971
  • [6] Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
  • [7] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [8] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [9] Brogle K, 2012, LECT NOTES COMPUT SC, V7658, P644, DOI 10.1007/978-3-642-34961-4_39
  • [10] A novel access control protocol using proxy signatures for cloud-based health information exchange
    Chandrasekhar, Santosh
    Ibrahim, Ahmed
    Singhal, Mukesh
    [J]. COMPUTERS & SECURITY, 2017, 67 : 73 - 88