Skip to main content
Log in

Novel proxy signature from lattice for the post-quantum internet of things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The internet of things (IoT), one of the emerging communication technologies, plays an essential role in the development of society. However, with the development of quantum computers, most existing cryptographic algorithms applied in IoT are vulnerable to adversaries equipped with quantum computers. Lattice-based cryptography, as one of the main candidate algorithms in the post-quantum era, has high computational speed and security. To this end, we propose a proxy signature scheme from lattice for the post-quantum IoT, which can resist quantum attacks. The fixed dimension lattice basis delegation technology, preimage sample technology, and other technologies have been used to improve security and efficiency. Then, we prove the unforgeability of this scheme in the random oracle model based on the shortest integer solution problem from lattice. Compare with other schemes, the proposed scheme is more efficient and is more suitable for transmission in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

All data used during the study appear in the submitted article.

References

  • Abdullah GM, Mehmood Q, Khan CBA (2018) Adoption of Lamport signature scheme to implement digital signatures in IoT. In: 2018 International conference on computing, mathematics and engineering technologies (iCoMET), pp 1–4. IEEE

  • Agrawal S, Boneh D, Boyen X (2010) Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: Annual cryptology conference, Springer, pp 98–115

  • Ajtai M (1999) Generating hard instances of the short basis problem. In: International colloquium on automata, languages, and programming, Springer, pp 1–9

  • Asif R (2021) Post-quantum cryptosystems for Internet-of-Things: a survey on lattice-based algorithms. IoT 2(1):71–91

    Article  Google Scholar 

  • Boldyreva A, Palacio A, Warinschi B (2012) Secure proxy signature schemes for delegation of signing rights. J Cryptol 25(1):57–115

    Article  MathSciNet  MATH  Google Scholar 

  • Cash D, Hofheinz D, Kiltz E, Peikert C (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 523–552

  • Chen L, Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) Report on post-quantum cryptography, vol 12. US Department of Commerce, National Institute of Standards and Technology

  • Cheng C-F, Chen Y-C, Lin JC-W (2020) A carrier-based sensor deployment algorithm for perception layer in the IoT architecture. IEEE Sens J 20(17):10295–10305

    Article  Google Scholar 

  • Das D, Saraswat V, Basu K (2020) Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems. IET Inf Secur 14(5):496–504

    Article  Google Scholar 

  • Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on theory of computing, pp 197–206

  • Hoffstein J, Howgrave-Graham N, Pipher J, Silverman JH, Whyte W (2003) NTRUSIGN: digital signatures using the NTRU lattice. In: Cryptographers’ track at the RSA conference, Springer, pp 122–140

  • Kim KS, Hong D, Jeong IR (2013) Identity-based proxy signature from lattices. J Commun Netw 15(1):1–7

    Article  Google Scholar 

  • Kuchta V, Sharma G (2020) Lattice-based cryptography and internet of things. In: IoT security: advances in authentication, pp 101–118

  • Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. Proc SCIS 2001:603–608

    Google Scholar 

  • Li W (2016) An identity-based proxy signature scheme from lattices in the standard model. In: 2016 International conference on intelligent networking and collaborative systems (INCoS), pp 167–172. IEEE

  • Li C, Xu G, Chen Y, Ahmad H, Li J (2019) A new anti-quantum proxy blind signature for blockchain-enabled Internet of Things. Comput Mater Contin 61(2):711–726

    Google Scholar 

  • Li Z, Wang J, Zhang W (2020) Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. J Ambient Intell Humaniz Comput 11(8):3337–3347

    Article  Google Scholar 

  • Li C, Tian Y, Chen X, Li J (2021) An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Inf Sci 546:253–264

    Article  MathSciNet  MATH  Google Scholar 

  • Lin Q, Li J, Huang Z, Chen W, Shen J (2018) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972

    Article  Google Scholar 

  • Lin JC-W, Srivastava G, Zhang Y, Djenouri Y, Aloqaily M (2020) Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet Things J 8(7):5340–5349

    Article  Google Scholar 

  • Lyubashevsky V (2012) Lattice signatures without trapdoors. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 738–755

  • Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM conference on computer and communications security, pp 48–57

  • Micciancio D, Goldwasser S (2002) Complexity of lattice problems: a cryptographic perspective. Kluwer Academic Publishers, Boston, Massachusetts

    Book  MATH  Google Scholar 

  • Micciancio D, Regev O (2007) Worst-case to average-case reductions based on Gaussian measures. SIAM J Comput 37(1):267–302

    Article  MathSciNet  MATH  Google Scholar 

  • Mughal MA, Luo X, Ullah A, Ullah S, Mahmood Z (2018) A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6:31630–31643

    Article  Google Scholar 

  • Sever M, Ozdemir AS (2021) A generalization of NTRU cryptosystem and a new digital signature version. Int J Maps Math 4(1):53–66

    MathSciNet  Google Scholar 

  • Seyhan K, Nguyen TN, Akleylek S, Cengiz K (2021) Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Cluster Comput. https://doi.org/10.1007/s10586-021-03380-7

    Article  Google Scholar 

  • Sha K, Wei W, Yang TA, Wang Z, Shi W (2018) On security challenges and open issues in Internet of Things. Future Gener Comput Syst 83:326–337

    Article  Google Scholar 

  • Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332

    Article  MathSciNet  MATH  Google Scholar 

  • Ullah I, Amin NU, Khan MA, Khattak H, Kumari S (2021) An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) system. J Med Syst 45(1):1–14

    Article  Google Scholar 

  • Verma GK, Singh BB (2017) Efficient message recovery proxy blind signature scheme from pairings. Trans Emerg Telecommun Technol 28(11):e3167

    Article  Google Scholar 

  • Wu F, Yao W, Zhang X, Zheng Z (2017) An efficient lattice-based proxy signature with message recovery. In: International conference on security, privacy and anonymity in computation, communication and storage, Springer, pp 321–331

  • Wu F, Wang Y, Xiao Z, Wenhua W, Zhiming Z (2019) Identity-based proxy signature over NTRU lattice. Int J Commun Syst 32(3):e3867

    Article  Google Scholar 

  • Xie J, Yu-pu H, Gao J-T, Gao W (2016) Efficient identity-based signature over NTRU lattice. Front Inf Technol Electron Eng 17(2):135–142

    Article  Google Scholar 

  • Yang C, Qiu P, Zheng S, Wang L (2015) An efficient lattice-based proxy signature scheme without trapdoor. In: 2015 International conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp 189–194. IEEE

  • Zhang C, Ma W, Zhao F (2019a) Trapdoor function based on the ring-LWE and applications in communications. J Ambient Intell Humaniz Comput 10(5):1821–1827

    Article  Google Scholar 

  • Zhang X, Zhao J, Xu C, Wang H, Zhang Y (2019b) DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2019.2942297

    Article  Google Scholar 

  • Zhu H, Xiao Y, Xue Y, Zhang Q, Zhu L, Li Y et al (2018) An identity-based proxy signature on NTRU lattice. Chin J Electron 27(2):297–303

    Article  Google Scholar 

Download references

Funding

This work was supported by the 2020 Graduate Innovative Research Project of Heilongjiang University of China under Grant YJSCX2020-166HLJU, the Scientific Research Project of Basic Scientific of Heilongjiang University under Grant KJCX201904 and the Scientific Research Project of Basic Scientific of Heilongjiang University under Grant 2020-KYYWF-1001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai Cheng.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, L., Huang, C. & Cheng, H. Novel proxy signature from lattice for the post-quantum internet of things. J Ambient Intell Human Comput 14, 9939–9946 (2023). https://doi.org/10.1007/s12652-021-03661-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03661-4

Keywords

Navigation