A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network
Abstract
:1. Introduction
2. Related Work and Security Definitions
Related Work
3. The Proposed Scheme
3.1. Preliminary
- n: A large prime number, which it computes from two large primes and such that , where .
- l: The total number of all Internet of Things (IoT for short) nodes.
- : A large prime number, which it computes from two large prime and such that , where .
- : An IoT data sender, which is a sensor node that forwards collected data to the receiver R, where and l is the number of all sensor nodes.
- : A base station, which helps to collect data sent from a sensor node , where .
- R: An IoT data receiver, which receives data from the sender .
- ⊕: An exclusive-or operation for symmetric encryption/decryption usage.
- , : Two secure hash functions that each of them maps with collision-resistance and outputs the same n-bits hash strings.
- : A symmetric key encryption function for the party j with the public key , where , where .
- : A symmetric key decryption function for the party j with the private key , where , where .
3.2. Initial Phase
- First, a node randomly chooses its own QR numbers (, , ) from similar with , and , where each of them is computed from and , respectively. Then, base station also selects two random QR numbers and such that they allow to belong to QR in . also publishes (n, , , ) to the signer . Once the signer has received them from , computes with a random number and the identifier with an identifier number z. After setting up these random numbers, forwards (, ) to and enters the offline-signing phase.
3.3. Offline-Signing Phase
- When has received () from the , also computes the following messages if the checking of z is valid, where . selects a random number and computes the following:
- After computing the above equations, also allows as and performs the following:
- From the above equations, we know that blinds the sensor data and computes a cipher-text . Then, forwards () to . When has received these messages from , it verifies above them with z, checks the h from , and enters the online-signing phase.
3.4. Online-Signing Phase
- When obtains () from , it could perform verification of these cipher-texts. If they are valid, then decrypts them with as follows:
- After decrypting the above cipher-texts successfully, computes the signature as follows with a QR number :
- The signer finishes the signing operation and generates the signature () to the data sender . When the node has received this signature, it could unblind the signature by computing the following operations:
- Then, the computes the final encrypted cipher-text messages to the in the following and enters the unsign-cryption phase:
3.5. Unsign-Cryption Phase
- When received these cipher-text messages from , it can decrypt by the following operations:
- After has computed this signature t from the above equation, it forwards to the node and allows the to decrypt and un-blinds this signature t as follows:
- After summarizes the above equation, we conclude that the node has the final signature , where . Then, the node can forward the sign-cryption signature and cipher-text messages to the receiver R of the Internet host.
- Once the receiver R has obtained this sign-cryption signature and cipher-text messages from , it can perform the following steps:
4. Functionality Comparisons and Security Analysis
4.1. Fast Sign-Cryption Operation
4.2. Signer Fair Signature Operation
4.3. User Data Protection
4.4. Efficiency Comparisons
4.5. Security Definitions
4.5.1. QR Signature Security
4.5.2. Unforgeability
4.5.3. Indistinguishability
4.5.4. Indistinguishable-Chosen Cipher-Text Attack (Ind-CCA for Short)
- Phase 1: In this phase, the attacker could make the encryption/decryption query on the chosen message m. If makes the encryption query on the m of the IoT device i, where , then inputs the m into , and , where . Here, will preserve these parameters into the encryption oracle list entry. On the other hand, asks the decryption query on the cipher-text (), will check if there are any parameters matching this cipher-text in the entry. If the answer is yes, forwards the original message back to and keeps this query in the decryption oracle entry.
- Challenge: In this phase, if chooses a target IoT device and a message pair (), where and are never asked the encryption query and decryption query before, and . In this time, will toss the coin flip b and inputs the into the encryption oracle . Finally, returns the target cipher-text () to . When has received this target cipher-text, it still can make the decryption query on other cipher-texts except ().
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
Appendix A
- Encrypting query: can make an encrypting query on the chosen message m, the target receiver i and the corresponding hash value . During this time, checks the list record and determines the random number . If there is no hash record on the list, will generate the entry for the random number on the list. Then, generates the corresponding cipher-texts in the following:Then, forwards this cipher-text () back to to finish this Encryption query and records () into the list to be noted as ().
- Decrypting query : When forwards a cipher-text () to , will search the list to see if there is any entry in this list; if yes, uses the to decrypt the cipher-text (). Finally, returns m back to .
- QR Signnature query: When makes the signature query on the chosen message m, will generate the following:After generating the signature and the corresponding cipher-text (), will check the signature list to see if there is any entry inside; if no, preserves the signature into the signature list and stores () in the list. Then, transfers back to . can make the above signature query several times on the chosen message m. If has made l times signature query on the message m, can forge signatures on the message m. Then, we can have the probability of adversary
- Cipher-text query on : In this simulation, can also launch a cipher-text query with an input the message m, the target receiver i, and the corresponding hash value to . When receiving this query, checks the list records and finds out if there exists a random number and other related records before. If there is no hash record on the list, will generate a new entry for the random number on the list. Then, performs the following steps:Subsequently, sends this cipher-text () back to and stores () into the list to be noted as ().
- Plain-text query on : When makes a plain-text query on with an cipher-text (), will search the list first to see if there is any entry inside or not; if yes, uses the to decrypt the cipher-text () and returns m back to .
- Signing query: When makes an QR signature signing query on the chosen cipher-text (), will calculate the following equations:
References
- Shim, K.A. CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks. IEEE Trans. Veh. Technol 2012, 61, 1874–1883. [Google Scholar] [CrossRef]
- Naresh, V.S.; Reddi, S.; Kumari, S.; Allavarpu, V.D.; Kumar, S.; Yang, M.H. Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things. IEEE Access 2021, 9, 21267–21278. [Google Scholar] [CrossRef]
- Sun, Y.; Li, H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 2010, 53, 557–566. [Google Scholar] [CrossRef] [Green Version]
- Li, F.; Xiong, P. Practical secure communication for integrating wireless sensor networks into the Internet of Things. IEEE Sens. J. 2013, 13, 3677–3684. [Google Scholar] [CrossRef]
- Hammi, B.; Fayad, A.; Khatoun, R.; Zeadally, S.; Begriche, Y. A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 2020, 3, 3440–3450. [Google Scholar] [CrossRef]
- Choi, S.; Ko, J.; Kwak, J. A Study on IoT Device Authentication Protocol for High Speed and Lightweight. In Proceedings of the 2019 International Conference on Platform Technology and Service (PlatCon), Jeju Island, Korea, 28–30 January 2019; pp. 1–5. [Google Scholar]
- Ning, H.; Liu, H.; Yang, L.T. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things. IEEE Trans. Parallel Distrib. Syst. 2015, 3, 657–667. [Google Scholar] [CrossRef]
- Kim, B.; Yoon, S.; Kang, Y.; Choi, D. PUF based IoT Device Authentication Scheme. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 16–18 October 2019; pp. 1460–1462. [Google Scholar]
- Lounis, K.; Zulkernine, M. T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT. IEEE Access 2021, 9, 137384–137405. [Google Scholar] [CrossRef]
- Taher, B.H.; Jiang, S.; Yassin, A.A.; Lu, H. Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction. IEEE Access 2019, 7, 148950–148966. [Google Scholar] [CrossRef]
- Rivest, R.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Fan, C.I.; Lei, C.L. A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 2002, 18, 47–58. [Google Scholar]
- Koblitz, N.; Menezes, A.; Vanstone, S. The state of Elliptic curve cryptography. Des. Codes Cryptgogr. 2000, 19, 173–193. [Google Scholar] [CrossRef]
- Lauter, K. The Advantages of Elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 2004, 11, 62–67. [Google Scholar] [CrossRef]
- Bertinoi, G.; Breveglieri, L.; Chen, L.; Fragneto, P.; Harrison, K.; Pelosi, G. A pairing SW implementation for smart cards. J. Syst. Softw. 2008, 81, 1240–1247. [Google Scholar] [CrossRef]
- Hankerson, D.; Menezes, A.; Scott, M. Software Implementation of pairings. Identity-Based Cryptogr. Cryptol. Inf. Secur. 2008, 2, 188. [Google Scholar]
- Hohenberger, S. Advances in Signatures, Encryption, and E-Cash from Bilinear Groups. Ph.D. Dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA, 2006. [Google Scholar]
- Li, Z.; Higgins, J.; Clement, M. Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. In Proceedings of the 9th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS’01), Cincinnati, OH, USA, 15–18 August 2001; pp. 249–256. [Google Scholar]
- Ramachanfdran, A.; Zhou, Z.; Huang, D. Computing cryptography algorithm in Portable and embedded devices. In Proceedings of the IEEE International Conference on Portable Information Devices, Orlando, FL, USA, 25–29 May 2007; pp. 1–7. [Google Scholar]
- Schneier, B. Applied Cryptography, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1996. [Google Scholar]
- Takashima, K. Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2007, 90, 152–159. [Google Scholar] [CrossRef]
Sign-Cryption | Unsign-Cryption | Totally | Approx. | |
---|---|---|---|---|
[1] | 2 + 1 | 3 + 1 + 1⊕ | 4 + 2 + 1 + 1⊕ | 327 + 1⊕ |
[2] | 4 + 1 + 2 + 1⊕ | 1 + 2 + 2 + 2 | 2 + 2 + 6 + 4 + 1⊕ | 647 + 1⊕ |
[3] | 4 + 1 + 2⊕ | 3 + 1 + 2⊕ | 1 + 1 + 7 + 4⊕ | 322.8 + 4⊕ |
[4] | 1 + 2 + 2 + 1⊕ | 2 + 3 + 1 + | 1 + 2+ 2 + 1 + 5 + 1⊕ | 409 + 1⊕ |
Ours | 4 + 29 + 1⊕ + 1 | 1 + 2 + 1⊕ | 33 + 1 + 1 + 6 + 2⊕ | 36.2 + 2⊕ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, M.-T.; Huang, H.-C. A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network. Appl. Sci. 2022, 12, 278. https://doi.org/10.3390/app12010278
Chen M-T, Huang H-C. A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network. Applied Sciences. 2022; 12(1):278. https://doi.org/10.3390/app12010278
Chicago/Turabian StyleChen, Ming-Te, and Hsuan-Chao Huang. 2022. "A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network" Applied Sciences 12, no. 1: 278. https://doi.org/10.3390/app12010278
APA StyleChen, M. -T., & Huang, H. -C. (2022). A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network. Applied Sciences, 12(1), 278. https://doi.org/10.3390/app12010278