Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks

Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving in heavy computational overhead or the management of certificates which can not be afforded by the marine wireless sensors. Combined with the concept of identity-based cryptography, few identity-based multi-signature (IBMS) schemes have been designed based on the integer factorization problem and without the bilinear pairing. In this paper, we propose two efficient IBMS schemes under the cubic residue assumption, which is equal to the integer factorization assumption. We employ two different methods to calculate a cubic root for a cubic residue number during the signer's private key extraction. The algorithms are quite efficient compared to the previous work, especially for the algorithms of the multi-signature generation and its verification.

[1]  Xiaolei Dong,et al.  Identity based signature scheme based on cubic residues , 2011, Science China Information Sciences.

[2]  Robert H. Deng,et al.  Efficient discrete logarithm based multi-signature scheme in the plain public key model , 2010, Des. Codes Cryptogr..

[3]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[4]  Matthew Green,et al.  Synchronized aggregate signatures: new definitions, constructions and applications , 2010, CCS '10.

[5]  Yixian Yang,et al.  Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues , 2012, Int. J. Netw. Secur..

[6]  Krste Asanovic,et al.  Energy Aware Lossless Data Compression , 2003, MobiSys.

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Lian Guangxin Efficient Identity-Based Threshold Ring Signature Based on Cubic Residues , 2013 .

[9]  Craig Gentry,et al.  Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.

[10]  Feng Wang,et al.  Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..

[11]  Weidong Qiu,et al.  Identity Based Signature Scheme Based on Quadratic Residues , 2007 .

[12]  Antonio Liotta,et al.  Ensembles of incremental learners to detect anomalies in ad hoc sensor networks , 2015, Ad Hoc Networks.

[13]  Adrian Perrig,et al.  Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  K. Itakura,et al.  A public-key cryptosystem suitable for digital multisignatures , 1983 .

[16]  Lifei Wei,et al.  Modeling and Analysis in Marine Big Data: Advances and Challenges , 2015 .

[17]  Fuw-Yi Yang,et al.  Improving an efficient ID-based RSA multisignature , 2013, J. Ambient Intell. Humaniz. Comput..

[18]  Mihir Bellare,et al.  Identity-Based Multi-signatures from RSA , 2007, CT-RSA.

[19]  Rui Zhang,et al.  An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..

[20]  Jung Hee Cheon,et al.  Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma , 2008, CCS.

[21]  Xiaolei Dong,et al.  Identity-based signature scheme based on quadratic residues , 2007, Science in China Series F: Information Sciences.

[22]  Stanislaw Jarecki,et al.  Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.

[23]  Lei Zhang,et al.  MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing , 2016, Secur. Commun. Networks.

[24]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[25]  Javier Herranz,et al.  Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$2k-th Power Residue Symbols , 2017, Journal of Cryptology.

[26]  Xiaolei Dong,et al.  Secure identity-based multisignature schemes under quadratic residue assumptions , 2013, Secur. Commun. Networks.