A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment

The cloud computing and the Internet of Things (IOT) applications provide great benefits for human's life. A large amount of IOT data is outsourced to cloud servers to reduce data management overhead. However, IOT data is vulnerable to various attacks during transmission, such as forgery or tampering attacks. Therefore, ensuring the authenticity of data is one of the fundamental security requirements in IOT environments. Identity-based signature scheme is a cryptosystem that protects data authenticity for IOT. However, most identity-based signature schemes do not offer an efficient user revocation mechanism. Hence, designing revocable identity-based signature (RIBS) schemes for resource-constrained IOT devices has become one of the most focused research trends. In this paper, we propose a secure and efficient RIBS scheme for IOT devices in which the revocation functionality is outsourced to a semi-trusted cloud server. The analysis results show that our RIBS scheme not only keeps the authenticity of IOT data, but also outperforms other RIBS schemes in terms of computational performance.

[1]  Tsuyoshi Takagi,et al.  Revocable and strongly unforgeable identity-based signature scheme in the standard model , 2016, Secur. Commun. Networks.

[2]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[3]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[4]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[7]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[8]  Marko Hölbl,et al.  Two proposed identity-based three-party authenticated key agreement protocols from pairings , 2010, Comput. Secur..

[9]  Chen Yuan,et al.  On the security of two identity-based signature schemes based on pairings , 2016, Inf. Process. Lett..

[10]  Xun Yi,et al.  An identity-based signature scheme from the Weil pairing , 2003, IEEE Communications Letters.

[11]  Sherali Zeadally,et al.  Efficient Revocable ID-Based Signature With Cloud Revocation Server , 2017, IEEE Access.

[12]  Wei Shi-min An Improved Elliptic Curve Digital Signature Algorithm , 2013 .

[13]  Yuh-Min Tseng,et al.  Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.

[14]  Wenfen Liu,et al.  Forward-secure identity-based signature with efficient revocation , 2017, Int. J. Comput. Math..

[15]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[16]  Joonsang Baek,et al.  A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification , 2017, IEEE Transactions on Services Computing.

[17]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[18]  Ying-Hao Hung,et al.  Strongly Secure Revocable ID-based Signature without Random Oracles , 2014, Inf. Technol. Control..

[19]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[20]  Kim-Kwang Raymond Choo,et al.  An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment , 2018, Ad Hoc Networks.

[21]  Jianfeng Ma,et al.  A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.