Skip to main content

Advertisement

Log in

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

An electronic health (e-health) system, such as a medical cyber-physical system, offers a number of benefits (e.g. inform medical diagnosis). There are, however, a number of considerations in the implementation of the medical cyber-physical system, such as the integrity of medical / healthcare data (e.g. manipulated data can result in misdiagnosis). A number of digital signature schemes have been proposed in recent years to mitigate some of these challenges. However, the security of existing signatures is mostly based on conventional difficult mathematical problems, which are known to be insecure against quantum attacks. In this paper, we propose a certificateless signature scheme, based on NTRU lattice. The latter is based on the difficulty of small integer solutions on the NTRU lattice, and is known to be quantum attack resilience. Security analysis and performance evaluations demonstrate that our proposed scheme achieves significantly reduced communication and computation costs in comparison to two other competing quantum resilience schemes, while being quantum attack resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE

  2. Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999

    Article  Google Scholar 

  3. Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics

  4. Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365

  5. Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018

    Article  Google Scholar 

  6. Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019

    Article  Google Scholar 

  7. Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015

    Article  Google Scholar 

  8. Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016

    Google Scholar 

  9. Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018

    Article  Google Scholar 

  10. Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61

  11. Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer

  12. Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018

    Article  Google Scholar 

  13. Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM

  14. Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer

  15. Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer

  16. Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer

  17. Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer

  18. Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer

  19. Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer

  20. Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM

  21. Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer

  22. Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer

  23. Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer

  24. Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer

  25. Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer

  26. Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer

  27. Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer

  28. Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011

    Google Scholar 

  29. Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014

    Article  Google Scholar 

Download references

Funding

This work is partially supported by the National Key Research and Development Program of China (No. 2018YFC1315404) and the National Natural Science Foundation of China under Grant 61902115, Grant 61932016, Grant 61972294, Grant 61772377, and Grant 61841701.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debiao He.

Ethics declarations

Conflict of interests

All authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Z., He, D., Vijayakumar, P. et al. Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. J Med Syst 44, 92 (2020). https://doi.org/10.1007/s10916-020-1527-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-020-1527-7

Keywords

Navigation