An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

被引:0
|
作者
Ouyang, Senshan [1 ,2 ]
Liu, Xiang [2 ]
Liu, Lei [2 ]
Wang, Shangchao [2 ]
Shao, Baichuan [3 ]
Zhao, Yang [3 ]
机构
[1] Northwestern Polytech Univ, Sch Mech Engn, Xian, Peoples R China
[2] Chengdu Aircraft Ind Grp Co Ltd, Dept Proc & Informat Technol, Chengdu, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, The Network & Data Secur Key Lab Sichuan Prov, Chengdu, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Key; -insulated; SM2; algorithm; digital signature; Industrial Internet of Things (IIoT); provable security;
D O I
10.32604/cmes.2023.028895
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation and secure key -updates. Our scheme uses the elliptic curve algorithm, which is not only more efficient but also more suitable for IIoT-cloud environments. Finally, the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm (ECDL) assumption in the random oracle.
引用
收藏
页码:903 / 915
页数:13
相关论文
共 50 条
  • [21] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    [J]. annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [22] Key-insulated group signature scheme with selective revocation
    Li, Rupeng
    Du, Xianghua
    Li, Guowen
    Yu, Jia
    Li, Daxing
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1057 - +
  • [23] An efficient and provably secure certificateless key insulated encryption with applications to mobile internet
    He, Libo
    Yuan, Chen
    Xiong, Hu
    Qin, Zhiguang
    [J]. International Journal of Network Security, 2017, 19 (06) : 940 - 949
  • [24] Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce
    Shi, Yang
    Lin, Jie
    Xiong, Guoyue
    Wang, Xiaoping
    Fan, Hongfei
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016 : 1 - 18
  • [25] Efficient ID-based Key-insulated Multi Signature Scheme without Pairings
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. 2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [26] An Efficient and Provably Secure Proxy Signature Scheme
    Zhang, Jianhong
    Xu, Min
    Su, Xiuna
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS, PTS 1 AND 2, 2011, 211-212 : 876 - +
  • [27] An efficient and provably secure proxy signature scheme
    Zhang, Jianhong
    Liu, Xue
    Gao, Shengnan
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [28] Parallel key-insulated signature scheme without random oracles
    [J]. 1600, Korean Institute of Communications and Information Sciences (15):
  • [29] Parallel Key-Insulated Signature Scheme without Random Oracles
    Wan, Zhongmei
    Li, Jiguo
    Hong, Xuan
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (03) : 252 - 257
  • [30] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +