Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2024

07-12-2023

A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system

Authors: Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang

Published in: Peer-to-Peer Networking and Applications | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Certificateless aggregate signature (CLAS) protocols mitigate the reliance upon the key-generating center of identity-rooted signatures. Consequently, they partly resolve the intrinsic key escrow issue found in identity-based encryption systems while upholding their implementation efficiency advantage. Over recent years, a range of new CLAS protocols has emerged aiming to transcend the communication and computation constraints of sensors. This is to ensure the integrity, validity, and accessibility of patients' health data within cloud-based healthcare monitoring systems (c-HMS). However, a number of these protocols fail to offer sufficient security guarantees—they are not secured for the post-quantum era, cannot repel collusion attacks, and require signing order, rendering them pseudo-aggregate schemes. Thus, this paper introduces a lattice-based unordered certificateless aggregate signature scheme (L-UCASS) specifically designed for cloud medical health monitoring systems. Additionally, our scheme leverages lattice architecture to guarantee security in the post-quantum era; adopts a certificateless structure to withstand attacks from untrustworthy key generation centers (KGC) and avoid key escrow; implements a bimodal Gaussian distribution to enhance efficiency; and utilizes an intersection technique to accomplish a true aggregate scheme and avert collusion attacks commonly occurring when more than two signers compute another signer’s private key. Finally, a comparative study reveals that our scheme successfully enhances protocol security without imposing significant spatial or temporal overhead. We also demonstrate that our scheme is existentially unforgeable in the context of adaptive chosen message attacks (EUF-CMA) against type I and type II adversaries in the random oracle model (ROM).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Boneh D, Gentry C, Lynn B et al (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham Eli (ed) International conference on the theory and applications of cryptographic techniques 2003, LNCS, vol 2656. Springer, Berlin, pp 416–432 Boneh D, Gentry C, Lynn B et al (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham Eli (ed) International conference on the theory and applications of cryptographic techniques 2003, LNCS, vol 2656. Springer, Berlin, pp 416–432
2.
go back to reference Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Chi-Sung L (ed) Asiacrypt: international conference on the theory and application of cryptology and information security 2003, LNCS, vol 2894. Springer, Berlin, pp 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Chi-Sung L (ed) Asiacrypt: international conference on the theory and application of cryptology and information security 2003, LNCS, vol 2894. Springer, Berlin, pp 452–473
4.
go back to reference Gong Z, Long Y, Hong X et al (2007) Two certificateless aggregate signatures from bilinear maps. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), vol 3. IEEE, Qingdao, China, pp 188−193. https://doi.org/10.1109/SNPD.2007.132 Gong Z, Long Y, Hong X et al (2007) Two certificateless aggregate signatures from bilinear maps. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), vol 3. IEEE, Qingdao, China, pp 188−193. https://​doi.​org/​10.​1109/​SNPD.​2007.​132
5.
go back to reference Deng J, Xu C, Wu H et al (2016) A new certificateless signature with enhanced security and aggregation version. Concurr Comput: Pract Experience 28(4):1124–1133CrossRef Deng J, Xu C, Wu H et al (2016) A new certificateless signature with enhanced security and aggregation version. Concurr Comput: Pract Experience 28(4):1124–1133CrossRef
6.
go back to reference Deng L, Yang Y, Chen Y et al (2018) Aggregate signature without pairing from certificateless cryptography. J Internet Technol 19(5):1479–1486 Deng L, Yang Y, Chen Y et al (2018) Aggregate signature without pairing from certificateless cryptography. J Internet Technol 19(5):1479–1486
7.
go back to reference Deng L, Yang Y, Chen Y (2019) Certificateless short aggregate signature scheme for mobile devices. IEEE Access 7:87162–87168CrossRef Deng L, Yang Y, Chen Y (2019) Certificateless short aggregate signature scheme for mobile devices. IEEE Access 7:87162–87168CrossRef
8.
go back to reference Hashimoto K, Ogata W (2019) Unrestricted and compact certificateless aggregate signature scheme. Inf Sci 487:97–114CrossRef Hashimoto K, Ogata W (2019) Unrestricted and compact certificateless aggregate signature scheme. Inf Sci 487:97–114CrossRef
9.
10.
go back to reference Shen L, Ma J, Miao Y et al (2019) Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model. IET Inf Secur 13(3):167–173CrossRef Shen L, Ma J, Miao Y et al (2019) Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model. IET Inf Secur 13(3):167–173CrossRef
11.
go back to reference Deng L, Ning B, Jiang Y (2020) A lightweight certificateless aggregation signature scheme with provably security in the standard model. IEEE Syst J 14(3):4242–4251CrossRefADS Deng L, Ning B, Jiang Y (2020) A lightweight certificateless aggregation signature scheme with provably security in the standard model. IEEE Syst J 14(3):4242–4251CrossRefADS
12.
go back to reference Liu X, Zhu H, Ma J et al (2014) Efficient attribute based sequential aggregate signature for wireless sensor networks. Int J Sensor Netw 16(3):172–184CrossRef Liu X, Zhu H, Ma J et al (2014) Efficient attribute based sequential aggregate signature for wireless sensor networks. Int J Sensor Netw 16(3):172–184CrossRef
13.
go back to reference Shen L, Ma J, Liu X et al (2016) A secure and efficient ID-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J 4(2):546–554CrossRef Shen L, Ma J, Liu X et al (2016) A secure and efficient ID-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J 4(2):546–554CrossRef
14.
go back to reference Shen L, Ma J, Liu X et al (2016) A provably secure aggregate signature scheme for healthcare wireless sensor networks. J Med Syst 40(11):1–10CrossRef Shen L, Ma J, Liu X et al (2016) A provably secure aggregate signature scheme for healthcare wireless sensor networks. J Med Syst 40(11):1–10CrossRef
15.
go back to reference Kumar P, Kumari S, Sharma V et al (2018) A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain Comput: Inform Syst 18:80–89 Kumar P, Kumari S, Sharma V et al (2018) A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain Comput: Inform Syst 18:80–89
16.
go back to reference Xie Y, Li X, Zhang S et al (2019) An improved certificateless aggregate signature scheme for healthcare wireless sensor networks. IEEE Access 7:15170–15182CrossRef Xie Y, Li X, Zhang S et al (2019) An improved certificateless aggregate signature scheme for healthcare wireless sensor networks. IEEE Access 7:15170–15182CrossRef
17.
go back to reference Zhan Y, Wang B (2019) Cryptanalysis of a certificateless aggregate signature scheme for healthcare wireless sensor network. Secur Commun Netw 2019:1–5CrossRef Zhan Y, Wang B (2019) Cryptanalysis of a certificateless aggregate signature scheme for healthcare wireless sensor network. Secur Commun Netw 2019:1–5CrossRef
18.
go back to reference Du H, Wen Q, Zhang S (2019) An efficient certificateless aggregate signature scheme without pairings for healthcare wireless sensor network. IEEE Access 7:42683–42693CrossRef Du H, Wen Q, Zhang S (2019) An efficient certificateless aggregate signature scheme without pairings for healthcare wireless sensor network. IEEE Access 7:42683–42693CrossRef
19.
go back to reference Gayathri NB, Thumbur G, Kumar PR et al (2019) Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J 6(5):9064–9075CrossRef Gayathri NB, Thumbur G, Kumar PR et al (2019) Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J 6(5):9064–9075CrossRef
20.
go back to reference Liu J, Wang L, Yu Y (2020) Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J 7(6):5256–5266CrossRef Liu J, Wang L, Yu Y (2020) Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J 7(6):5256–5266CrossRef
21.
go back to reference Deng L, Yang Y, Gao R (2021) Certificateless designated verifier anonymous aggregate signature scheme for healthcare wireless sensor networks. IEEE Internet Things J 8(11):8897–8909CrossRef Deng L, Yang Y, Gao R (2021) Certificateless designated verifier anonymous aggregate signature scheme for healthcare wireless sensor networks. IEEE Internet Things J 8(11):8897–8909CrossRef
22.
go back to reference Yang W, Wang S, Mu Y (2020) An enhanced certificateless aggregate signature without pairings for E-Healthcare system. IEEE Internet Things J 8(6):5000–5008CrossRef Yang W, Wang S, Mu Y (2020) An enhanced certificateless aggregate signature without pairings for E-Healthcare system. IEEE Internet Things J 8(6):5000–5008CrossRef
23.
go back to reference Nielsen M, Chuang I (2000) Quantum computation and quantum information. Cambridge Univ Press 70:558–559 Nielsen M, Chuang I (2000) Quantum computation and quantum information. Cambridge Univ Press 70:558–559
24.
go back to reference Shor P (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41:303–332MathSciNetCrossRefADS Shor P (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41:303–332MathSciNetCrossRefADS
26.
go back to reference Lu X, Yin W, Wen Q et al (2018) A lattice-based unordered aggregate signature scheme based on the intersection method. IEEE Access 6:33986–33994CrossRef Lu X, Yin W, Wen Q et al (2018) A lattice-based unordered aggregate signature scheme based on the intersection method. IEEE Access 6:33986–33994CrossRef
27.
go back to reference Xie J, Hu Y, Gao J et al (2019) Certificateless sequential aggregate signature scheme on NTRU lattice. Chin J Electron 28(2):294–300CrossRef Xie J, Hu Y, Gao J et al (2019) Certificateless sequential aggregate signature scheme on NTRU lattice. Chin J Electron 28(2):294–300CrossRef
29.
go back to reference Quan Y (2022) Improving bitcoin’s post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on crystals-dilithium and a STARK protocol. IEEE Access 10:132472–132482CrossRef Quan Y (2022) Improving bitcoin’s post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on crystals-dilithium and a STARK protocol. IEEE Access 10:132472–132482CrossRef
30.
go back to reference Darzi S, Akhbari B, Khodaiemehr H (2022) LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust Comput 25(1):263–278CrossRef Darzi S, Akhbari B, Khodaiemehr H (2022) LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust Comput 25(1):263–278CrossRef
31.
go back to reference Qian J, Cao Z, Lu M et al (2021) The secure lattice-based data aggregation scheme in residential networks for smart grid. IEEE Internet Things J 9(3):2153–2164CrossRef Qian J, Cao Z, Lu M et al (2021) The secure lattice-based data aggregation scheme in residential networks for smart grid. IEEE Internet Things J 9(3):2153–2164CrossRef
35.
go back to reference Micciancio D, Regev O (2004) Worst-case to average-case reductions based on Gaussian measure. SIAM J Comput 37(1):372–381MathSciNet Micciancio D, Regev O (2004) Worst-case to average-case reductions based on Gaussian measure. SIAM J Comput 37(1):372–381MathSciNet
Metadata
Title
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system
Authors
Songshou Dong
Yanqing Yao
Yihua Zhou
Yuguang Yang
Publication date
07-12-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01588-5

Other articles of this Issue 1/2024

Peer-to-Peer Networking and Applications 1/2024 Go to the issue

Premium Partner