Abstract
Internet of Things (IoT) techniques have been employed in many areas, e.g., vehicles, smart home, and medicine. Among the applications of IoTs, the Internet of Vehicles (IoV) is one of the most popular techniques. IoVs are protected by public key cryptographic systems, such as RSA and ECC. However, such systems are vulnerable to quantum computer attacks. Thus, we improve the security of IoV-based post-quantum signatures, which can resist quantum computer attacks. The key operations are divisions in a finite field. Hence, we improve the security of IoV-based post-quantum signatures with division by employing systolic architectures. We propose a systolic architecture for computing division in composite fields. After that, we improve the IoT security-based post-quantum signatures with systolic divisions. We test and verify our design on a Field-Programmable Gate Array (FPGA); the experimental results confirm our estimates. Furthermore, the optimized method proposed can be further applied to various applications like solving system of linear equations and cryptographic applications for IoT security.
- [1] . 2018. Consumer acceptance of Internet of Things (IoT): Smart home context. Journal of Computer Information Systems 36 (2018), 1–11.Google Scholar
- [2] . 2018. On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36, 6 (2018), 25–35.Google ScholarDigital Library
- [3] . 2018. Social Internet of Vehicles: Architecture and enabling technologies. Computers & Electrical Engineering 69 (2018), 68–84.Google ScholarCross Ref
- [4] . 2009. Post-quantum cryptography: Lattice signatures. Computing 85, 1–2 (2009), 105–125.Google ScholarDigital Library
- [5] . 2017. Hash-based signatures: State of play. IEEE Security & Privacy 15, 4 (2017), 37–43.Google ScholarDigital Library
- [6] . 2005. A class of unidirectional bit serial systolic architectures for multiplicative inversion and division over GF(2m). IEEE Transactions on Computers 54, 3 (
March 2005), 370–380. Google ScholarDigital Library - [7] . 2017. Current state of multivariate cryptography. IEEE Security & Privacy 15, 4 (2017), 28–36.Google ScholarDigital Library
- [8] . 1994. Fast inverters and dividers for finite field GF(2m). In 1994 IEEE Asia-Pacific Conference on Circuits and Systems, 1994 (APCCAS’94).206 –211. Google ScholarCross Ref
- [9] . 2000. Novel iterative division algorithm over GF(2m) and its semi-systolic VLSI realization. In Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems, 2000, Vol. 1. 280–283. Google ScholarCross Ref
- [10] . 2019. Leveraging utilization as performance metric for CDN enabled energy efficient internet of things. Measurement 147 (2019), 106814. Google ScholarCross Ref
- [11] . 2018. Lightweight RFID protocol for medical privacy protection in IoT. IEEE Transactions on Industrial Informatics 14, 4 (2018), 1656–1665.Google ScholarCross Ref
- [12] . 2018. Recent patient health monitoring platforms incorporating Internet of Things-enabled smart devices. International Neurourology Journal 22, Suppl 2 (2018), S76–82.Google ScholarCross Ref
- [13] . 2017. Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Transactions on Consumer Electronics 63, 2 (2017), 200–207.Google ScholarDigital Library
- [14] . 2017. Efficient spatial keyword query processing in the internet of industrial vehicles. Mobile Networks & Applications 23, 6 (2017), 1–15.Google Scholar
- [15] . 2015. Fully secure fuzzy identity-based encryption for secure IoT communications. Computer Standards & Interfaces 44 (2015), 1–18.Google Scholar
- [16] . 2020. Implementation of a reliability test protocol for a multimeasurement sensor dedicated to industrial applications of the internet of things. Measurement 152 (2020), 107312. Google ScholarCross Ref
- [17] . 2017. Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications. IEEE Transactions on Wireless Communications 16, 11 (2017), 7574–7589.Google ScholarCross Ref
- [18] . 2017. Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors. Journal of Supercomputing 74, 2 (2017), 1–26.Google Scholar
- [19] . 2018. Particle swarm optimization tuned cascade control system in an internet of things (IoT) environment. Measurement 117 (2018), 80–89. Google ScholarCross Ref
- [20] . 2017. Code-based cryptography: State of the art and perspectives. IEEE Security & Privacy 15, 4 (2017), 44–50.Google ScholarDigital Library
- [21] . 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140 (2017), 1454–1464.Google ScholarCross Ref
- [22] . 2017. Post-quantum cryptography. Nature 549, 7671 (2017), 188.Google ScholarCross Ref
- [23] . 1993. A systolic architecture for computing inverses and divisions in finite fields GF(2m). IEEE Transactions on Computers 42, 9 (
Sep. 1993), 1141–1146. Google ScholarDigital Library - [24] . 2018. Internet of Vehicles: Sensing-aided transportation information collection and diffusion. IEEE Transactions on Vehicular Technology 67, 5 (2018), 3813–3825.Google ScholarCross Ref
- [25] . 2018. Offloading in Internet of Vehicles: A fog-enabled real-time traffic management system. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4568–4578.Google ScholarCross Ref
- [26] . 2002. An ASIC implementation of the AES SBoxes. In Topics in Cryptology-CT-RSA 2002. 29–52.Google Scholar
- [27] . 2004. High-speed, low-complexity systolic designs of novel iterative division algorithms in GF(2m). IEEE Transactions on Computers 53, 3 (
March 2004), 375–380. Google ScholarDigital Library - [28] . 2020. Data transmission method for sensor devices in Internet of Things based on multivariate analysis. Measurement (2020), 107536. Google ScholarCross Ref
- [29] . 2003. New systolic architectures for inversion and division in GF(2m). IEEE Transactions on Computers 52, 11 (
Nov. 2003), 1514–1519. Google ScholarDigital Library - [30] . 2017. Lightweight break-glass access control system for healthcare Internet-of-Things. IEEE Transactions on Industrial Informatics PP, 99 (2017), 1–1.Google Scholar
- [31] . 2020. Challenges and recommended technologies for the industrial Internet of Things: A comprehensive review. Measurement 151 (2020), 107198. Google ScholarCross Ref
- [32] . 2019. Physical unclonable function-based key sharing via machine leaning for IoT security. IEEE Transactions on Industrial Electronics PP, 99 (2019), 1–1.Google Scholar
- [33] . 2019. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Transactions on Industrial Informatics 15 (2019), 5099–5108.Google Scholar
- [34] . 2017. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine 55, 1 (2017), 26–33.Google ScholarDigital Library
Index Terms
- Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions
Recommendations
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityRecent work, including ZKBoo, ZKB++, and Ligero, has developed efficient non-interactive zero-knowledge proofs of knowledge (NIZKPoKs) for Boolean circuits based on symmetric-key primitives alone, using the "MPC-in-the-head" paradigm of Ishai et al. We ...
Compact Ring Signatures with Post-Quantum Security in Standard Model
Information Security and CryptologyAbstractRing signatures allow a ring member to produce signatures on behalf of all ring users but remain anonymous. At PKC 2022, Chatterjee et al. defined post-quantum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. ...
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Applied Cryptography and Network SecurityAbstractRing signatures and ID-based cryptography are considered promising in terms of application. A ring signature authenticates messages while the author of the message remains anonymous. ID-based cryptographic primitives suppress the need for ...
Comments