| Literature DB >> 28906439 |
Lifei Wei1, Lei Zhang2, Dongmei Huang3, Kai Zhang4, Liang Dai5, Guojian Wu6.
Abstract
Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emerged and attracted the interest of researchers and engineers. A multi-signature enables the data aggregation through one signature to authenticate various signers on the acknowledgement of a message, which is quite fit for data authenticated aggregation marine WSNs. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving heavy computational overhead or the management of certificates, which cannot be afforded by the marine wireless sensors. Combined with the concept of identity-based cryptography, a few pairing-free identity-based multi-signature (IBMS) schemes have been designed on the basis of the integer factorization problem. In this paper, we propose two efficient IBMS schemes that can be used to construct provably secure data authenticated aggregation protocols under the cubic residue assumption, which is equal to integer factorization. We also employ two different methods to calculate a cubic root for the cubic residue number during the signer's private key extraction. The algorithms are quite efficient compared to the previous work, especially for the algorithms of the multi-signature generation and its verification.Entities:
Keywords: data authenticated aggregation; identity-based multi-signature; integer factorization; marine WSNs; provably secure
Year: 2017 PMID: 28906439 PMCID: PMC5621058 DOI: 10.3390/s17092117
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Data collection in marine wireless sensor networks (WSNs).
The comparison of related work on the security assumptions.
| Schemes | The Underlying Mathematical Assumptions |
|---|---|
| [ | Computational Diffie-Hellman (CDH) |
| [ | Discrete Logarithm (DL) |
| [ | RSA |
| [ | Quadratic Residues |
|
| Cubic Residues |
|
| Cubic Residues |
The comparison of related work of IBMS on the computational performance.
| Schemes | Extract | Sign | Verify | Total Time | Length |
|---|---|---|---|---|---|
| [ | 2 | 1 | 3 | 107.52 | 2 |
| [ | 1 | 2 | 2 | 26.55 |
|
| [ | 1 | 2 | 2 | 26.55 |
|
| [ | 1 | 2 | 2 | 26.55 |
|
|
| 1 | 2 | 2 | 26.55 |
|
|
| 2 | 1 | 1 | 21.24 |
|
The comparison of related work on computational performance based on the cubic residues.
| Schemes | Underlying Cryptographic Primitive | Sign | Verify | Total Time |
|---|---|---|---|---|
| [ | IBMPS | 3 | 3 | 6 |
| [ | IBPMS | 1 | 3 | 4 |
| [ | IBMPMS | 3 | 3 | 6 |
|
| IBMS | 2 | 2 | 4 |
|
| IBMS | 1 | 1 | 2 |