Online/offline signature based on UOV in wireless sensor networks

Being a member of the post quantum cryptography family, multivariate public key cryptographic (MPKC) system enjoys many useful properties such as fast implementation and moderate resources requirement, which is quite suitable for the wireless sensor network (WSN). However, MPKC system requires the usage of large public and private keys to ensure security which makes it inapplicable to wireless sensors with very limited system resources. In this paper, we propose an online/offline signature scheme based on a well known MPKC scheme: unbalanced oil and vinegar signature scheme for the wireless sensor network. Our scheme can reduce the cost of hardware running on signing process and the storage space of private key in the online signing phase. What is more, by combining a recent technique, the total storage requirement in a WSN node reduces by 85.8 % for the recommended parameters, which makes our new scheme feasible for the practical deployment on the WSN platforms.

[1]  Chen-Mou Cheng,et al.  New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.

[2]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[3]  Markus Rückert,et al.  Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles , 2010, PQCrypto.

[4]  Yi Mu,et al.  Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.

[5]  Jean-Charles Faugère,et al.  On the Security of UOV , 2008, IACR Cryptol. ePrint Arch..

[6]  Jianying Zhou,et al.  Wireless Sensor Network Security , 2008 .

[7]  Rei-Heng Cheng,et al.  Enhancing Network Availability by Tolerance Control in Multi-Sink Wireless Sensor Network , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[8]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[9]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Liusheng Huang,et al.  A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model , 2012, Int. J. Netw. Secur..

[11]  Lei Hu,et al.  Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme , 2011, ISPEC.

[12]  Tsuyoshi Takagi,et al.  Efficient Variant of Rainbow without Triangular Matrix Representation , 2014, ICT-EurAsia.

[13]  Stanislav Bulygin,et al.  CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key , 2010, INDOCRYPT.

[14]  Kaoru Kurosawa,et al.  New Online/Offline Signature Schemes Without Random Oracles , 2006, Public Key Cryptography.

[15]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[16]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[17]  Stanislav Bulygin,et al.  Linear Recurring Sequences for the UOV Key Generation , 2011, Public Key Cryptography.

[18]  Dae-Wha Seo,et al.  Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).

[19]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[20]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[21]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[22]  R. B. Patel,et al.  Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks , 2011, Int. J. Inf. Technol. Commun. Convergence.

[23]  Ariel Shamir,et al.  Cryptanalysis of the oil and vinegar signature scheme , 1998 .

[24]  Marc Joye,et al.  An Efficient On-Line/Off-Line Signature Scheme without Random Oracles , 2008, CANS.

[25]  Tsuyoshi Takagi,et al.  Efficient variant of Rainbow using sparse secret keys , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[26]  Tim Güneysu,et al.  Embedded Syndrome-Based Hashing , 2012, INDOCRYPT.

[27]  Silvio Micali,et al.  On-Line/Off-Line Digital Schemes , 1989, CRYPTO.

[28]  Praveen Budhwar,et al.  TinyOS: An Operating System for Wireless Sensor Networks , 2015 .

[29]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[30]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[31]  Anup Kumar,et al.  Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks , 2011, Int. J. Inf. Technol. Commun. Convergence.

[32]  Albrecht Petzoldt,et al.  Small private keys for systems of multivariate quadratic equations using symmetric cryptography , 2012 .

[33]  Adi Shamir,et al.  Cryptanalysis of the Oil & Vinegar Signature Scheme , 1998, CRYPTO.

[34]  Jean Charles Faugère,et al.  A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.