Abstract
The Internet of Things (IoT) has been more and more popular in people’s lives because it can bring convenience to our lives. Communication between IoT smart devices is vulnerable to various attacks. Therefore, designing a lightweight and secure cryptographic protocol for IoT applications is an important task. In this paper, we find that Jia et al.’s certificateless signature scheme cannot resist public key replacement attacks. Then, we propose a new certificateless signature scheme (PK-CLS) to resist super type I and type II adversaries. Finally, we prove the security of our PK-CLS scheme in the random oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rivera, J., der Meulen, V.R.: Gartner says 4.9 billion connected things will be in use in 2015. 11 Nov 2014 [cited 2016 Feb 20]. http://www.gartner.com/newsroom/id/2905717
Liu, Y.N., Wang, Y.P., Wang, X.F., et al.: Privacy-preserving raw data collection without a trusted authority for IoT. Comput. Netw. 148, 340–348 (2019)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73458-1_23
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005). https://doi.org/10.1007/11599371_2
Shim, K.A.: Breaking the short certificateless signature scheme. Inf. Sci. 179(3), 303–306 (2009)
Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110–116. Springer, Heidelberg (2005). https://doi.org/10.1007/11596981_16
Cao, X., Paterson, K.G., Kou, W.: An attack on a certificateless signature scheme. IACR Cryptol. ePrint Archive 2006, 367 (2006)
Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC 2006. LNCS, vol. 4097, pp. 322–331. Springer, Heidelberg (2006). https://doi.org/10.1007/11807964_33
He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)
Tsai, J.L., Lo, N.W., Wu, T.C.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)
Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. Int. J. Commun. Syst. 27(10), 2083–2091 (2014)
Islam, S.K.H., Biswas, G.P.: Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 90(11), 2244–2258 (2013)
Yeh, K.H., Tsai, K.Y., Fan, C.Y.: An efficient certificateless signature scheme without bilinear pairings. Multimedia Tools Appl. 74(16), 6519–6530 (2015)
Wang, L., Chen, K., Long, Y., et al.: A modified efficient certificateless signature scheme without bilinear pairings. In: 2015 International Conference on Intelligent Networking and Collaborative Systems (INCOS), IEEE, pp. 82–85 (2015)
Yeh, K.H., Su, C., Choo, K.K.R., et al.: A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors 17(5), 1001 (2017)
Jia, X., He, D., Liu, Q., et al.: An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Netw. 71, 78–87 (2018)
Karati, A., Islam, S.K.H., Biswas, G.P.: A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450, 378–391 (2018)
Yeh, K.H., Tsai, K.Y., Kuo, R.Z., et al.: Robust certificateless signature scheme without bilinear pairings. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE (2013)
Pakniat, N., Vanda, B.A.: Cryptanalysis and improvement of a pairing-free certificateless signature scheme. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1–5. IEEE (2018)
Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No. 61702237, No. 61472343, the Natural Science Foundation of Jiangsu Province, China under Grant No. BK20150241, the Special Foundation of Promoting Science and Technology Innovation of Xuzhou City, China under Grant No. KC18005, the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province, China under Grant No. 14KJB520010, the Scientific Research Support Project for Teachers with Doctor’s Degree of Jiangsu Normal University under Grant No. 14XLR035, and Jiangsu Provincial Government Scholarship for Overseas Studies, under which the present work was possible.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Z., Liu, Y., Yin, X., Li, X. (2019). A New Pairing-Free Certificateless Signature Scheme for Internet of Things. In: Liu, F., Xu, J., Xu, S., Yung, M. (eds) Science of Cyber Security. SciSec 2019. Lecture Notes in Computer Science(), vol 11933. Springer, Cham. https://doi.org/10.1007/978-3-030-34637-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-34637-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34636-2
Online ISBN: 978-3-030-34637-9
eBook Packages: Computer ScienceComputer Science (R0)