An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

被引:0
|
作者
Ouyang, Senshan [1 ,2 ]
Liu, Xiang [2 ]
Liu, Lei [2 ]
Wang, Shangchao [2 ]
Shao, Baichuan [3 ]
Zhao, Yang [3 ]
机构
[1] Northwestern Polytech Univ, Sch Mech Engn, Xian, Peoples R China
[2] Chengdu Aircraft Ind Grp Co Ltd, Dept Proc & Informat Technol, Chengdu, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, The Network & Data Secur Key Lab Sichuan Prov, Chengdu, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Key; -insulated; SM2; algorithm; digital signature; Industrial Internet of Things (IIoT); provable security;
D O I
10.32604/cmes.2023.028895
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation and secure key -updates. Our scheme uses the elliptic curve algorithm, which is not only more efficient but also more suitable for IIoT-cloud environments. Finally, the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm (ECDL) assumption in the random oracle.
引用
收藏
页码:903 / 915
页数:13
相关论文
共 50 条
  • [1] An Efficient Key-Insulated Signature Scheme
    Liang, Xiangqian
    Wang, Yandong
    Gao, Dezhi
    Zhang, Yonghua
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 29 - +
  • [2] An efficient threshold key-insulated signature scheme
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Li X.-X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 658 - 662
  • [3] An Efficient Threshold Key-Insulated Signature Scheme
    陈剑洪
    龙宇
    陈克非
    王永涛
    李祥学
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 658 - 662
  • [4] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [5] Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments
    Xiong, Hu
    Mei, Qian
    Zhao, Yanan
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 310 - 320
  • [6] Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    [J]. MOBILE LIGHTWEIGHT WIRELESS SYSTEMS, 2009, 13 : 35 - 44
  • [7] Efficient and secure pairing-free certificateless strong key-insulated signature scheme
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (03) : 155 - 166
  • [8] A new key-insulated signature scheme
    González-Deleito, N
    Markowitch, O
    Dall'Olio, E
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 465 - 479
  • [9] An efficient strong key-insulated signature scheme and its application
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    [J]. PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 150 - +
  • [10] A new provably secure certificateless signature scheme for Internet of Things
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    Gao, Mingchu
    [J]. AD HOC NETWORKS, 2020, 100