Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things

被引:14
|
作者
Qiao, Zirui [1 ]
Zhou, Yanwei [1 ,2 ,3 ]
Yang, Bo [1 ]
Zhang, Mingwu [3 ]
Wang, Tao [1 ]
Xia, Zhe [4 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Guilin 541004, Peoples R China
[3] Guilin Univ Elect & Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2022年 / 16卷 / 03期
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Cryptography; Security; Data communication; Servers; Receivers; Proposals; Certificate-based cryptography; industrial Internet of Things (IIoT); proxy signature; security analysis;
D O I
10.1109/JSYST.2021.3131589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To improve the security of industrial Internet of things (IIoT), several concrete constructions of certificate-based proxy signature (CBPS) scheme without bilinear pairing were proposed in the last few years. However, many previous constructions were found impractical, either fail to meet the claimed security properties or contain design flaws. In particular, in some instances, a malicious proxy signer can claim to be the original signer by forwarding the messages from original signer to any proxy signer, and the receiver cannot determine whether the delegation of signing power has been reused. In this article, we first demonstrate some security issues and design flaws in the previous proposals of CBPS scheme. As follows, to further address the above deficiencies, three new constructions of CBPS scheme with improved security are introduced. In the first two proposals, the delegation validity can be verified by the designated verifier (proxy signer), and the delegation of signing power for the last construct is publicly verifiable (any signer). Furthermore, formal security proofs are given using forking lemma in the random oracle, assuming that the discrete logarithm problem is hard. Compared with the previous CBPS schemes, our constructions are efficient with respect to computation and communication. Finally, we discuss the two necessary conditions for constructing secure CBPS schemes, to avoid security flaws in future research.
引用
收藏
页码:4719 / 4730
页数:12
相关论文
共 50 条
  • [1] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [2] An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Wang, Tao
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 72 - 82
  • [3] SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment
    Verma, Girraj Kumar
    Kumar, Neeraj
    Gope, Prosanta
    Singh, B. B.
    Singh, Harendra
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11): : 9305 - 9316
  • [4] Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography
    Ullah, Insaf
    Alkhalifah, Ali
    Althobaiti, Maha M.
    Al-Wesabi, Fahd N.
    Hilal, Anwer Mustafa
    Khan, Muhammad Asghar
    Wu, Jimmy Ming-Tai
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Chamola, Vinay
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2563 - 2572
  • [6] Provably secure certificate-based proxy blind signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    [J]. INFORMATION SCIENCES, 2018, 468 : 1 - 13
  • [7] An efficient and provable certificate-based proxy signature scheme for IIoT environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Obaidat, Mohammad S.
    He, Debiao
    Singh, Harendra
    [J]. INFORMATION SCIENCES, 2020, 518 : 142 - 156
  • [8] Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
    Choi, Jusop
    Cho, Junsung
    Kim, Hyoungshick
    Hyun, Sangwon
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [9] An optimal secure and reliable certificateless proxy signature for industrial internet of things
    Ullah, Rafiq
    Mehmood, Amjad
    Khan, Muhammad Altaf
    Maple, Carsten
    Lloret, Jaime
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2205 - 2220
  • [10] Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
    Zhu, Fei
    Xu, Feihong
    Yang, Xu
    Yi, Xun
    Abuadbba, Alsharif
    [J]. INFORMATION PROCESSING LETTERS, 2022, 173