Information Security and Cryptology

Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this paper, we first outline IoT security and privacy risks and critical related requirements in different application domains. We then discuss aspects of a roadmap for IoT security and privacy with focus on access control, software and firmware, and intrusion detection systems. We conclude the paper by outlining a few challenges.

[1]  Yi Mu,et al.  Universal Designated Multi Verifier Signature Schemes , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[2]  Li Xu,et al.  A new universal designated verifier transitive signature scheme for big graph data , 2017, J. Comput. Syst. Sci..

[3]  Reihaneh Safavi-Naini,et al.  Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures , 2009, IET Inf. Secur..

[4]  Silvio Micali,et al.  Transitive Signature Schemes , 2002, CT-RSA.

[5]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[6]  Yi Mu,et al.  Identity-Based Universal Designated Verifier Signatures , 2005, EUC Workshops.

[7]  Yi Mu,et al.  Secure universal designated verifier signature without random oracles , 2008, International Journal of Information Security.

[8]  Marek Klonowski,et al.  Kleptographic Attacks on E-Voting Schemes , 2006, ETRICS.

[9]  Zhenfu Cao,et al.  Transitive Signatures from Braid Groups , 2007, INDOCRYPT.

[10]  Anthony J. G. Hey,et al.  Jim Gray on eScience: a transformed scientific method , 2009, The Fourth Paradigm.

[11]  Paulo S. L. M. Barreto,et al.  Fast hashing onto elliptic curves over fields of characteristic 3 , 2001, IACR Cryptol. ePrint Arch..

[12]  Susan Rae Hohenberger,et al.  The cryptographic impact of groups with infeasible inversion , 2003 .

[13]  Yang Ming,et al.  Universal designated multi verifier signature scheme without random oracles , 2008, Wuhan University Journal of Natural Sciences.

[14]  Mihir Bellare,et al.  Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.

[15]  Ashutosh Saxena,et al.  Universal Designated Multi Verifier Signature without Random Oracles , 2006, 9th International Conference on Information Technology (ICIT'06).

[16]  Li Xu,et al.  Universal designated verifier transitive signatures for graph-based big data , 2015, Inf. Sci..

[17]  Joonsang Baek,et al.  Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) , 2005, ASIACRYPT.

[18]  Zheng Huang,et al.  Transitive Signature Scheme from LFSR , 2010 .

[19]  Jean-Jacques Quisquater,et al.  Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions , 2006, SCN.

[20]  Jin Li,et al.  Universal Designated Verifier Ring Signature (Proof) Without Random Oracles , 2006, EUC Workshops.

[21]  Fabien Laguillaumie,et al.  On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures , 2007, ISC.

[22]  Jia Xu On Directed Transitive Signature , 2009, IACR Cryptol. ePrint Arch..

[23]  Xun Yi Directed Transitive Signature Scheme , 2007, CT-RSA.

[24]  Yi Mu,et al.  Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.

[25]  Yi Mu,et al.  Restricted Universal Designated Verifier Signature , 2006, UIC.

[26]  Mihir Bellare,et al.  Transitive Signatures Based on Factoring and RSA , 2002, ASIACRYPT.

[27]  Miroslaw Kutylowski,et al.  Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices , 2016, Mycrypt.

[28]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[29]  Gregory Neven A simple transitive signature scheme for directed trees , 2008, Theor. Comput. Sci..

[30]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[31]  Ron Steinfeld,et al.  Universal Designated-Verifier Signatures , 2003, ASIACRYPT.

[32]  Philippe Camacho,et al.  Short Transitive Signatures for Directed Trees , 2012, CT-RSA.

[33]  Yi Mu,et al.  Identity-based Universal Designated Verifier Signature Proof System , 2009, Int. J. Netw. Secur..