Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things

被引:21
作者
Hou, Yingzhe [1 ]
Xiong, Hu [1 ]
Huang, Xin [1 ]
Kumari, Saru [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
关键词
Aggregates; Industrial Internet of Things; Resists; Temperature sensors; Smart devices; Digital signatures; Public key cryptography; Aggregate signature; certificate based; fully chosen-key attacks; Industrial Internet of Things (IIoT); key insulated; IDENTITY-BASED SIGNATURE; PROVABLY SECURE; DIGITAL-SIGNATURES; SCHEME; EFFICIENT; ENCRYPTION;
D O I
10.1109/JIOT.2021.3056477
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of the Industrial Internet of Things (IIoT), numerous operations based on smart devices contribute to producing the convenience and comfortable applications for individuals and organizations. Considering the untrusted feature of the communication channels in IIoT, it is essential to ensure the authentication and incontestableness of the messages transmitted in the IIoT. In this article, we first proposed a certificate-based parallel key-insulated aggregate signature (CB-PKIAS), which can resist the fully chosen-key attacks. Concretely, the adversary who can obtain the private keys of all signers in the system is able to forge a valid aggregate signature by using the invalid single signature. Furthermore, our scheme inherits the merits of certificate based and key insulated to avoid the certificate management problem, key-escrow problems, as well as the key exposures simultaneously. In addition, the rigorous analysis and the concrete simulation experiment demonstrated that our proposed scheme is secure under the random oracle and more suitable for the IIoT environment.
引用
收藏
页码:8935 / 8948
页数:14
相关论文
共 53 条
[1]   Novel Anonymous Key Establishment Protocol for Isolated Smart Meters [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (04) :2844-2851
[2]   Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications [J].
Al-Turjman, Fadi ;
Alturjman, Sinem .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2736-2744
[3]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103
[4]   A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs [J].
Ali, Ikram ;
Gervais, Mwitende ;
Ahene, Emmanuel ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 99
[5]  
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[6]   PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Hammoudeh, Mohammad ;
Dargahi, Tooska .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 :899-918
[7]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[10]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18