Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments

With the continuous development of the industrial Internet of Things (IIoT), many organizations opt for storing the data collected by smart devices on a cloud server for saving costs. Considering the untrusted nature of the communication channel, how to ensure the authenticity of data is an urgent matter to be solved. Certificateless signatures that can provide an authentication mechanism for the data seem to be a viable option to this problem. Nevertheless, the certificateless signature scheme proposed so far is either easy to be broken or inefficient. In this paper, a pairing-free and provably secure certificateless parallel key-insulated signature (CL-PKIS) scheme is put forward for securing the communication in the IIoT environment. Unlike previous work in this field, our scheme not only uses elliptic curves to maintain higher efficiency, but also implants key-insulated primitive to reduce the risk of key exposures. Besides, our scheme provides a parallel mechanism to make it more suitable for the IIoT environment, which was not available in previous solutions. Finally, the security of our CL-PKIS scheme is proved under the discrete logarithm assumption in the random oracle model.

[1]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[2]  Kuo-Hui Yeh,et al.  A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments , 2018, IEEE Systems Journal.

[3]  G. P. Biswas,et al.  A pairing-free and provably secure certificateless signature scheme , 2018, Inf. Sci..

[4]  Chunhua Su,et al.  A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things , 2017, Sensors.

[5]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[6]  Tao Li,et al.  Provably secure certificate‐based key‐insulated signature scheme , 2014, Concurr. Comput. Pract. Exp..

[7]  Yanan Chen,et al.  Strongly secure certificateless key-insulated signature secure in the standard model , 2015, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP).

[8]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[9]  Rui Zhang,et al.  An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..

[10]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[11]  Vipul Goyal,et al.  Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.

[12]  SK Hafizul Islam,et al.  Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.

[13]  Kyung-Ah Shim,et al.  A New Certificateless Signature Scheme Provably Secure in the Standard Model , 2019, IEEE Systems Journal.

[14]  Jian Weng,et al.  Certificateless strong key-insulated signature , 2011, International Conference on Information Science and Technology.

[15]  Liusheng Huang,et al.  Cryptanalysis of a certificateless signature scheme without pairings , 2013, Int. J. Commun. Syst..

[16]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[17]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.

[18]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[19]  Schahram Dustdar,et al.  Principles for Engineering IoT Cloud Systems , 2015, IEEE Cloud Computing.

[20]  Athanasios V. Vasilakos,et al.  Software-Defined Industrial Internet of Things in the Context of Industry 4.0 , 2016, IEEE Sensors Journal.

[21]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[22]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[23]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[24]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[25]  Jung Hee Cheon,et al.  Security Analysis of the Strong Diffie-Hellman Problem , 2006, EUROCRYPT.

[26]  Jian Weng,et al.  Certificateless key-insulated signature without random oracles , 2009 .

[27]  Jan Camenisch,et al.  Efficient Structure-Preserving Signature Scheme from Standard Assumptions , 2012, SCN.

[28]  Keqin Li,et al.  Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data , 2017, IEEE Transactions on Cloud Computing.

[29]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[30]  Peng Gong,et al.  Further improvement of a certificateless signature scheme without pairing , 2014, Int. J. Commun. Syst..

[31]  Tommaso Melodia,et al.  Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.

[32]  Yang Lu,et al.  An improved certificateless strong key-insulated signature scheme in the standard model , 2015, Adv. Math. Commun..

[33]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[34]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[35]  Jia-Lun Tsai,et al.  A New Efficient Certificateless Short Signature Scheme Using Bilinear Pairings , 2017, IEEE Systems Journal.