[go: up one dir, main page]

Skip to main content

A New Pairing-Free Certificateless Signature Scheme for Internet of Things

  • Conference paper
  • First Online:
Science of Cyber Security (SciSec 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11933))

Included in the following conference series:

  • 944 Accesses

Abstract

The Internet of Things (IoT) has been more and more popular in people’s lives because it can bring convenience to our lives. Communication between IoT smart devices is vulnerable to various attacks. Therefore, designing a lightweight and secure cryptographic protocol for IoT applications is an important task. In this paper, we find that Jia et al.’s certificateless signature scheme cannot resist public key replacement attacks. Then, we propose a new certificateless signature scheme (PK-CLS) to resist super type I and type II adversaries. Finally, we prove the security of our PK-CLS scheme in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rivera, J., der Meulen, V.R.: Gartner says 4.9 billion connected things will be in use in 2015. 11 Nov 2014 [cited 2016 Feb 20]. http://www.gartner.com/newsroom/id/2905717

  2. Liu, Y.N., Wang, Y.P., Wang, X.F., et al.: Privacy-preserving raw data collection without a trusted authority for IoT. Comput. Netw. 148, 340–348 (2019)

    Article  Google Scholar 

  3. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  4. Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73458-1_23

    Chapter  Google Scholar 

  5. Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005). https://doi.org/10.1007/11599371_2

    Chapter  Google Scholar 

  6. Shim, K.A.: Breaking the short certificateless signature scheme. Inf. Sci. 179(3), 303–306 (2009)

    Article  MathSciNet  Google Scholar 

  7. Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005). https://doi.org/10.1007/11596981_16

    Chapter  Google Scholar 

  8. Cao, X., Paterson, K.G., Kou, W.: An attack on a certificateless signature scheme. IACR Cryptol. ePrint Archive 2006, 367 (2006)

    Google Scholar 

  9. Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC 2006. LNCS, vol. 4097, pp. 322–331. Springer, Heidelberg (2006). https://doi.org/10.1007/11807964_33

    Chapter  Google Scholar 

  10. He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)

    Article  Google Scholar 

  11. Tsai, J.L., Lo, N.W., Wu, T.C.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)

    Article  Google Scholar 

  12. Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. Int. J. Commun. Syst. 27(10), 2083–2091 (2014)

    Article  Google Scholar 

  13. Islam, S.K.H., Biswas, G.P.: Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 90(11), 2244–2258 (2013)

    Article  Google Scholar 

  14. Yeh, K.H., Tsai, K.Y., Fan, C.Y.: An efficient certificateless signature scheme without bilinear pairings. Multimedia Tools Appl. 74(16), 6519–6530 (2015)

    Article  Google Scholar 

  15. Wang, L., Chen, K., Long, Y., et al.: A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International Conference on Intelligent Networking and Collaborative Systems (INCOS), IEEE, pp. 82–85 (2015)

    Google Scholar 

  16. Yeh, K.H., Su, C., Choo, K.K.R., et al.: A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors 17(5), 1001 (2017)

    Article  Google Scholar 

  17. Jia, X., He, D., Liu, Q., et al.: An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Netw. 71, 78–87 (2018)

    Article  Google Scholar 

  18. Karati, A., Islam, S.K.H., Biswas, G.P.: A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450, 378–391 (2018)

    Article  MathSciNet  Google Scholar 

  19. Yeh, K.H., Tsai, K.Y., Kuo, R.Z., et al.: Robust certificateless signature scheme without bilinear pairings. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE (2013)

    Google Scholar 

  20. Pakniat, N., Vanda, B.A.: Cryptanalysis and improvement of a pairing-free certificateless signature scheme. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1–5. IEEE (2018)

    Google Scholar 

  21. Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No. 61702237, No. 61472343, the Natural Science Foundation of Jiangsu Province, China under Grant No. BK20150241, the Special Foundation of Promoting Science and Technology Innovation of Xuzhou City, China under Grant No. KC18005, the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province, China under Grant No. 14KJB520010, the Scientific Research Support Project for Teachers with Doctor’s Degree of Jiangsu Normal University under Grant No. 14XLR035, and Jiangsu Provincial Government Scholarship for Overseas Studies, under which the present work was possible.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yali Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Z., Liu, Y., Yin, X., Li, X. (2019). A New Pairing-Free Certificateless Signature Scheme for Internet of Things. In: Liu, F., Xu, J., Xu, S., Yung, M. (eds) Science of Cyber Security. SciSec 2019. Lecture Notes in Computer Science(), vol 11933. Springer, Cham. https://doi.org/10.1007/978-3-030-34637-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34637-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34636-2

  • Online ISBN: 978-3-030-34637-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics