| Literature DB >> 30463382 |
Xiuhua Lu1,2, Wei Yin3, Qiaoyan Wen4, Kaitai Liang5, Liqun Chen6, Jiageng Chen7.
Abstract
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to the Internet to collect all kinds of information needed in real time. The reliability of the source of a large number of accessed information tests the processing speed of signatures. Batch signature allows a signer to sign a group of messages at one time, and signatures' verification can be completed individually and independently. Therefore, batch signature is suitable for data integration authentication in IoT. An outstanding advantage of batch signature is that a signer is able to sign as many messages as possible at one time without worrying about the size of signed messages. To reduce complexity yielded by multiple message signing, a binary tree is usually leveraged in the construction of batch signature. However, this structure requires a batch residue, making the size of a batch signature (for a group of messages) even longer than the sum of single signatures. In this paper, we make use of the intersection method from lattice to propose a novel generic method for batch signature. We further combine our method with hash-and-sign paradigm and Fiat⁻Shamir transformation to propose new batch signature schemes. In our constructions, a batch signature does not need a batch residue, so that the size of the signature is relatively smaller. Our schemes are securely proved to be existential unforgeability against adaptive chosen message attacks under the small integer solution problem, which shows great potential resisting quantum computer attacks.Entities:
Keywords: IoT; batch signature; intersection method; lattice; message integration authentication; tree structure
Year: 2018 PMID: 30463382 PMCID: PMC6263490 DOI: 10.3390/s18114056
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The Schematic of the Binary Tree.
Figure 2The Schematic of the Intersection Method.
Efficiency comparison of our schemes.
| Scheme (Size/Computation) | Our 1st Scheme (with Binary Tree) | Our 2nd Scheme (With Intersection Method) | Our 3rd Scheme (With FS Transformation) |
|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
| signature |
|
|
|
|
|
|
|
|
|
|
|
| 3 |
|
|
|
|
|
Notation: denotes Hash function, denotes SamplePre, denotes verification.
Figure 3Data Flow Diagram in Wireless Body Sensor Network.