Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2017 Sep 14;17(9):2117. doi: 10.3390/s17092117

PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs

Lifei Wei 1, Lei Zhang 1,*, Dongmei Huang 1, Kai Zhang 2, Liang Dai 1, Guojian Wu 1
PMCID: PMC5621058  PMID: 28906439

Abstract

Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emerged and attracted the interest of researchers and engineers. A multi-signature enables the data aggregation through one signature to authenticate various signers on the acknowledgement of a message, which is quite fit for data authenticated aggregation marine WSNs. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving heavy computational overhead or the management of certificates, which cannot be afforded by the marine wireless sensors. Combined with the concept of identity-based cryptography, a few pairing-free identity-based multi-signature (IBMS) schemes have been designed on the basis of the integer factorization problem. In this paper, we propose two efficient IBMS schemes that can be used to construct provably secure data authenticated aggregation protocols under the cubic residue assumption, which is equal to integer factorization. We also employ two different methods to calculate a cubic root for the cubic residue number during the signer’s private key extraction. The algorithms are quite efficient compared to the previous work, especially for the algorithms of the multi-signature generation and its verification.

Keywords: identity-based multi-signature, provably secure, integer factorization, data authenticated aggregation, marine WSNs

1. Introduction

In most of the wireless sensor networks (WSNs), the significant issue for data collection or data aggregation always lies in the center of data transmission, both in the academia and in the industry [1,2,3]. In most scenarios of marine WSNs, all the nearby wireless sensors send their data, such as the temperature, pressure, salinity, and potential of hydrogen (pH value) in the chemistry of the environmental monitoring ocean, to a central node, which is located at a base station or a buoy for data collection, as shown in Figure 1. The central node further sends the aggregated data through the long-distance data transmission networks, such as vessel-based or satellite-based networks [4]. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks has emerged and attracted the interest of researchers and engineers. In order to mitigate the malicious attackers injecting false data, it is quite necessary for each central node to authenticate these sensing measurements from the nearby sensors in the ocean observation system [5].

Figure 1.

Figure 1

Data collection in marine wireless sensor networks (WSNs).

Generally, a digital signature often provides the properties of authenticity and non-repudiation through checking the signed acknowledgments from senders [6]. However, in WSNs, the international standards for broadcasting authentication are very vulnerable to signature verification flooding attacks, as the excessive requests for signature verification must run out of the computational resources of those victims [7]. The scenario seems worse, as the marine wireless sensors are powered by a limited battery and cannot afford these overloaded requests in an oceanic environment. To optimize the communication and computational overhead, a variant of digital signature, named multi-signature, permits various signers to sign on a message individually and aggregate partial signatures to a compact signature [8].

A multi-signature can play a significant role in authenticating different sensors’ data by checking a single compact signature to cut down the communication bandwidth for marine wireless devices, as the transmission of one-bit data consumes more energy than the arithmetic operations on several bits [9]. This seems a promising way to solve the data authentication in a multi-user scenario. Since the primitive has been proposed, multi-signature schemes have been paid attention to by most of the network designers and industry engineers. However, in the past years, most of the work on multi-signature schemes has been constructed by relying on the assumed existence of public key infrastructure (PKI) [10,11]; the heavy burdens of the digital public key certificate management bring high communication overhead and storage overhead when PKI is applied and implemented in the wireless networks. The cases become worse when the sensors are deployed in the marine environments (denoted as Problem 1).

To overcome the weakness brought by PKI, identity-based cryptography emerges as a novel cryptographic primitive and a powerful alternative to traditional certificate-based cryptography, which has been raised early on in [12] and is further specifically designed in [13,14]. Identity-based cryptography makes some public, known information a public key, such as the device’s number, IP address, or a username, to mitigate the management problem for the public key certificates. In the extreme case that the bandwidth is a bottleneck, the identities of the signers often appear in the head of the communication packets, instead of in the transmission of the heavy public keys. Inspired by this concept, the first identity-based multi-signature (IBMS) scheme, proposed in [15], uses a mathematical technique named “bilinear mapping”, such as is used in [13], and is proved to be secure, relying on discrete logarithm (DL) assumptions or computational Diffie–Hellman (CDH) assumptions. Because the operation of bilinear mapping involves too much computational overhead [16,17], many bilinear mapping techniques are not suitable for the battery-limited sensors in marine WSNs (denoted as Problem 2).

As a consequence, there is great interest for cryptographic researchers to design pairing-free identity-based cryptographic schemes [18]. The first non-pairing IBMS scheme was proposed in [19] with three-round interactive communications and under R. Rivest, A. Shamir, L. Adleman (RSA) assumptions. Later, a communication efficiency-improved IBMS scheme under RSA assumptions was presented in [20] with two-round interactive communications. Yang et al. [21] proposed an efficient improved IBMS scheme that aims to save the computational resources and communication bandwidth. Even if the RSA assumption approaches the integer factorization assumptions, unfortunately, the RSA assumption has not yet been proved equal to the factorization assumption (denoted as Problem 3).

To satisfy the application requirements and to avoid security concerns in cryptrography, it is common practice to construct alternative cryptographic schemes under a weaker assumption—integer factorization. Recently, cryptographic researchers have been focused on finding a new construction that is proved to be secure directly on the basis of factorization. Chai [22] gave an instance of an identity-based digital signature relying on the quadratic residue assumption. Following this, Wei et al. [6] proposed IBMS schemes using quadratic residue assumptions, under weaker assumptions and a strengthened security model, achieving advantages in the computational consumption and transmission overhead. Xing [23] and Wang [24] presented identity-based signature schemes under the cubic residue assumptions. Wang proposed several signature variants relying on cubic residues, including identity-based ring signature [25], identity-based proxy multi-signature (IBPMS) [26] and threshold ring signature [27]. Wei [28] considered an identity-based multi-proxy signature (IBMPS) scheme for use in a cloud-based data authentication protocol. Zhang [29] proposed a secure multi-entity delegated authentication protocol based on an identity-based multi-proxy multi-signature (IBMPMS) for mobile cloud computing. Unfortunately, none considered constructing IBMS schemes directly based on cubic residues (denoted as Problem 4).

Facing the above problems, this work constructs IBMS schemes relying on the cubic residue assumption equal to integer factoring. Our schemes have merits not only in the efficiency aspect, where we do not rely on the bilinear pairing maps or over exponentiations, but also in the security aspect, where we prove them to be secure under a weaker assumption of factoring to achieve stronger security. The contributions for this paper can be summarized as follows.

  1. We have proposed two efficient IBMS schemes, denoted as IBMSCR−1 and IBMSCR−2, which are suitable for data aggregation among the sensors and collectors in marine WSNs.

  2. We formally define the security of IBMS and prove IBMSCR−1 to be secure, relying on the cubic residues in a random oracle model. The computational cost of IBMSCR−1 is lower, as the exponentiations are cubic exponentials.

  3. To enhance efficiency, the total computational cost of IBMSCR−2 is almost four-fifths that of IBMSCR−1 in implementation. We also prove the security of IBMSCR−2 on the basis of the cubic residues equalling integer factoring in the random oracle model.

The organization of this paper is as follows. Section 2 gives necessary preliminaries, and Section 3 gives the formal definition of the security model. In Section 4 and Section 5, we propose two concrete IBMS schemes, IBMSCR−1 and IBMSCR−2, as well as outline their correctness and full security proof. Section 6 gives the performance comparison. Section 7 gives the conclusion for the paper.

2. Preliminaries

Some fundamental concepts are introduced simply, for further explaining the construction and security proof.

2.1. Cubic Residue

We first introduce the definition of the cubic residue.

Definition 1

(Cubic residue [23]). For an integer N1(mod3), a cubic residue modulo N, cZN*, if x3c(modN) for some xZN*.

Because the module N is a product for unknown p and q, it is difficult to obtain x from a cubic residue c, that is, the difficulty of obtaining x from c is equal to the factorization of N.

2.2. Cubic Residue Symbol in Eisenstein Ring

Following the work in [23,30,31], we let ω denote a complex root of z2+z+1=0, which means that ω is a cubic root of 1. We also have ω2=1ω=ω¯, where ω¯ is the conjugate complex of ω. The Eisenstein ring is defined as the set Z[ω]={a+bω|a,bZ}. We introduce the cubic residue symbol as follows:

··3:Z[ω]×(Z[ω](1ω)Z[ω]){0,1,ω,ω2}

For a prime p in Z[ω] where p is not associated to 1ω, we have

αp3=α(N(p)1)/3(modp)

where N(p)=p·p¯ is defined as the norm of p.

2.3. Some Useful Theorems

Theorem 1

(Factorization Theorem [23]). Let N=pq, where p and q are large primes. Let c be a cubic residue modulo N, and r1 and r2 be c’s two cubic roots modulo N; that is, r13r23c(modN) and r1r2(modN). N can be factored by taking gcd(r1r2,N) in polynomial time, where gcd(x,y) is the greatest common divisor of x and y.

Theorem 1 is easily validated, as if r13r23c(modN), we have (r1r2)(r12+r1r2+r22)0(modN). There must exist an integer k such that (r1r2)(r12+r1r2+r22)=kpq. If r1r2(modN), r1r2 cannot be a multiple of N at the same time; r1r2 must contain a non-trivial divisor of N, which is p or q. Therefore, the integer N can be factored by Theorem 1. However, the two cubic roots satisfying r1r2(modN) cannot lead directly to factoring the integer N.

The following theorem shows a solution to compute a 3-th root of a cubic residue without factoring N.

Theorem 2.

Let ω1(mod3), >0, c be a cubic residue modulo N, and XZN* satisfy

cωX3(modN)

Then we can easily calculate the cubic root y; that is, y3c(modN).

Because ω1(mod3), we can denote ω=3r(3δ+1); following this,

cωc3r(3δ+1)X3(modN)

We take the 3r-th root and obtain

c3δ+1X3r(modN)

Because c3δ+1=c3δ·c, we have

cX3rc3δX3r1cδ3(modN).

Let y=X3r1/cδ; then we have y3c(modN)

Theorem 2 can be used in the security proof for IBMSCR−1. We introduce the following Theorem [24,29] regarding the cubic residue used in the security proof for IBMSCR−2.

Theorem 3 

(Cubic residue construction [24,29]). If p and q are two primes with p2(mod3) and q4 or 7(mod9), it is easy to produce a cubic residue modulo N. Let nc be a non-cubic modulo q, for any hZN*; we can compute that η=(q1)(mod9)3 , λ=η(mod2)+1, β=(q1)/3, ξncηβ(modq), τhλβ(modq) and

b=0,if τ=11,if τ=ξ2,if τ=ξ2

We can construct a cubic residue C modulo N; that is, C=ncb·h(modN).

Theorem 4.

Let p, q, N, C, and η be defined as in Theorem 3; we can calculate a cubic root s of C1 by sC[2η1(p1)(q1)3]/9(modN). Note that s3·C1(modN).

3. Formal Definition and Security Model

3.1. Formal Definition

We assume that there exist n distinct signers, named ID1,ID2,,IDn, to authenticate a message m by cooperatively generating a multi-signature mσ. The signer IDi is denoted as signeri.

Theorem 5.

A typical IBMS scheme is always made up of six algorithms, that is, Setup, Extra, Sign, Verify, MSign, and MVerify. We describe each of them as follows.

  • Setup: (mpk,msk)Setup(1k). The algorithm is controlled by the key generator center (KGC). The KGC generates the system’s master public keys mpk and master secret keys msk when it is given the security parameter k.

  • Extra: skID Extra (mpk, msk, ID). The algorithm is also controlled by the KGC, given msk, mpk, and a user’s identity ID, such as a string. It returns the private key skID through secure channels.

  • Sign: σSign (mpk, sk, m, ID): The signer uses its private key sk, the identity ID, and the message to be signed m to generate a signature σ on m.

  • Verify: {0,1} Verify (mpk, ID, m, σ): The algorithm takes the signer’s identity ID, the data m, and a candidate signature σ. If σ is a valid signature, it returns 1. Otherwise, it returns 0.

  • MSign: mσ MSign (mpk, sk, m, IDSet). The signer with the private sk joins in the multi-signing algorithm, which needs additional parameters, including a message m and an identity set IDSet={ID1,ID2,,IDn} containing all the identities of the signers. After several rounds of interactive communication, MSign generates a multi-signature mσ.

  • MVerify: {0,1} MVerify (mpk, IDSet, m, mσ). The algorithm returns 1 if mσ is a valid multi-signature on the message m by authenticating the signers in IDSet.

Correctness. When all of the participating signers honestly and correctly execute the algorithm MSign using the private keys, derived from the algorithm Extra, each of the signers will end the algorithm by obtaining a local multi-signature mσ such that

MVerify(IDSet,m,mσ,mpk)=1

where all mpk and msk are generated by the algorithm Setup and IDSet includes n identities ID1,ID2,,IDn for any messages m{0,1}*.

3.2. Security Model

This considers an extreme case: the adversary A compromising the n1 participants and leaving only one honest user, denoted signer1. The signer1 user is controlled by the challenger C. When the game starts, C gives A the honest identity of signer1 and allows A to compromise the other signers’ private keys. It also assume that a secure channel between the signers is not guaranteed. All of the communication among the signers can be eavesdropped upon. C provides A a hash oracle, a key extraction oracle and a multi-sign oracle. A’s final target is to successfully forge a multi-signature.

Definition 2.

Considering the games between A and C.

  • Setup: C executes the algorithm to generate the master public keys mpk and sends mpk to A.

  • Query: : A is allowed to query to C in an adaptive way.

    • -

      Extraction-query (mpk, ID). C executes Extra to obtain skID and sends to A when A asks for the private key of signerID.

    • -

      Multi-signature query (mpk, m, IDSet) C obtains a multi-signature mσ and sends to A when A asks for the multi-signature mσ on m and IDSet.

    • -

      Hash-query. C chooses the returned values by itself and sends to A when A asks.

  • Forgery. A makes a multi-signature as a forgery, that is, mσ* on m* for IDSet*, which contains at least one uncompromised user’s identity; meanwhile, A never sends (mpk,IDSet*,m*) to the multi-signature query.

Definition 3 (Attack Goals).

The advantage AdvAIBMS in breaking the KG(k) problems is defined as

AdvAIBMS(k)=Prx3y(modN)(N,p,q)KG(k)yZN*xA(N,,y)

Definition 4 (Unforgeability).

An adversary A(t,qH,qE,qS,n,ϵ) breaks the scheme if A executes for a time of t at most, and makes at most qH hash queries, qE extraction queries, and qS multi-signature queries with n participants, and AdvA is at least ϵ. An IBMS scheme (t,qE,qS,qH,n,ϵ) has unforgeability if there exists no attacker A(t,qH,qE,qS,n,ϵ) that breaks it.

4. Concrete Construction of IBMSCR-1

4.1. Construction

Inspired by the previous work [6,22,23], we propose a concrete identity-based multi-signature scheme (IBMSCR−1) with three-round interactive communications among the marine sensors and the generation of a single multi-signature as an authenticated tag.

  • Setup (k,): The key generator center inputs security parameters k and , and then:
    1. Chooses two random primes p and q, such that pq1(mod3) and (p1)(q1)/91(mod3). Without loss of generality, we assume that (p1)/31(mod3), (q1)/31(mod3).
    2. Chooses two random primes π1 and π2 from the Eisenstein ring Z[ω], s.t. the norms satisfy N(π1)=p and N(π2)=q.
    3. Computes N=pq. We let A+Bω=π1π2, A,BZ, and then compute C=AB1(modN). Note that Cp3=ω2, and Cq3=ω.
    4. Chooses a random number aZN* such that aN3=ω.
    5. Computes d=13[19(p1)(q1)+1].
    6. Selects three hash functions h1(·), h2(·), and h3(·) such that h1(·):{0,1}*ZN*, h2 and h3(·):{0,1}*{0,1}.

As a result of the step Setup, the master secret key is msk=(p,q,d), which is securely stored, and the public parameter is mpk=(N,h1,h2,h3,a,C,).

  • Extra (mpk, msk, ID): KGC inputs the identity ID, computes the hash value of ID as h1(ID) and obtains a first symbol cID,1 such that
    cID,1=0,ifh1(ID)N3=11,ifh1(ID)N3=ω22,ifh1(ID)N3=ω
    We let h=acID,1·h1(ID) and we have hN3=1. Following this, KGC computes a second symbol cID,2 such that
    cID,2=0,ifhp3=hq3=11,ifhp3=ω,hq3=ω22,ifhp3=ω2,hq3=ω
    We let IID=CcID,2·acID,1·h1(ID). It is easy to find that IIDCRN, as IIDp3=IIDq3=1. Finally, KGC extracts the private key skID as a 3-th root of IID:
    skIDIIDd(modN) (1)
    KGC sends skID as well as (cID,1,cID,2) to signer ID secretly. Note that IIDskID3(modN). Following this, we denote ID˜={ID,cID,1,cID,2}.
  • Sign and verify: These two algorithms can be derived from [23].

  • MSign (mpk,sk1,m,IDSet): For simplicity, IBMSCR−1 is described from the MS1’s point of view. Given the MS1’s private key sk1, the message m and the identity set IDSet={ID1˜,ID2˜,,IDn˜}, MS1 executes the following algorithm from Algorithm 1. MSign generates mσ=(w,u) as the multi-signature.

  • MVerify (mpk, IDSet, m, mσ). The algorithm verifies by the following three steps.

    • (1)

      For i=1,2,,n, it computes IiCcIDi,2·acIDi,1·h1(IDi)(modN).

    • (2)

      It computes R^u3i=1nIiw(modN).

    • (3)
      It checks whether
      w=h3(R^IDSetm) (2)
      is satisfied. If Equation (2) is satisfied, MVerify returns 1. This means mσ is valid. Otherwise MVerify returns 0.

4.2. Correctness

The correctness follows:

u3i=1nui3i=1nri3skiw3i=1nRiIi(3d)wRi=1nIiw(modN)

We have R^Ru3i=1nIiw(modN).

Algorithm 1: The MSign Algorithm in IBMS CR−1.
Input: the master public key mpk, the private key sk, the identity set IDSet, the message to be signed m;
Output: a multi-signature mσ.
  1. Each MSi randomly selects riZN* and computes Riri3(modN) and ti=h2(Ri).
  2. MSi only broadcasts ti to other signers MSj (ji) in IDSet and keeps Ri temporarily.
  3. After receiving ti from MSi (2in), MS1 then broadcasts R1 to other MSi.
  4. After receiving Ri from MRi, MS1 checks whether ti=h2(Ri) for 2in is satisfied.
  5. If one of these fails, the algorithm stops, which means the attackers have mixed invalid partial signatures. Otherwise, MS1 sets Ri=1nRi(modN), w=h3(RIDSetm), and u1r1·sk1w(modN).
  6. MS1 broadcasts u1 to other MSi.
  7. After receiving ui from MSi, MS1 aggregates these by ui=1nui(modN).
  8. Each MSi locally generates a multi-signature mσ=(w,u).
Return mσ;

4.3. Security Proof

IBMSCR−1 is provably secure under the factorization in the random oracle model.

Theorem 6.

If the factorization problem is (t,ϵ)-hard, IBMSCR−1 is (t,qE,qH,qS,n,ϵ)-secure against existential forgery attackers under the adaptively chosen message attack and chosen identity attack. We have estimates for t and ϵ as follows:

ϵ2ϵ23(qH+1)2nqSqH+n2qS2+qH22R·(qH+1)+nqS201ϵ13·21 (3)

Proof. 

We assume C is given a factorization instance N for a product of unknown p and q, and obtain the result of p or q with a non-negligible probability. C plays with A as follows.

Firstly, C selects aZN*, such as a non-cubic residue and a secure parameter 160 (the length of has been discussed and suggested in [22]), and sends (N,a,) to A as mpk. C manages several lists: one signature list and three hash lists.

Then, C starts to answer according to A’s queries, as follows.

  • h1-Query (ID): C manages a list (ID,h1,s,cID,1,cID,2). When A requests the identity ID, C answers as h1. (cID,1,cID,2){0,1}2 in two bits and sZN* is used as a secret key. When A asks on ID, C answers h1 if ID has existed in the h1-list. Otherwise, C randomly selects sZN* and (cID,1,cID,2){0,1}2, calculates
    h1s3(1)cID,2·(a)cID,1(modN) (4)
    and returns the answer h1 to A, adding (ID,h1,s,cID,1,cID,2) to the h1-list.
  • h2-Query (R): C manages a list (R,h2). When A asks on R, C answers h2 if R has existed in the h2-list. Otherwise, C randomly selects h2{0,1}0, adds (R,h2) into the h2-list and returns h2.

  • h3-Query (R,m,IDSet): C manages a list (R,m,IDSet,h3). When A asks on (R,m,IDSet), C returns h3 if (R,m,IDSet) has existed in the h3-list. Otherwise, C randomly selects h3ZN*, returns h3, and adds (R,m,IDSet,h3) to the h3-list.

  • Extraction query (ID): C executes an additional h1-query if ID does not yet exist in the h1-list and returns s and (cID,1,cID,2).

  • Multi-signature queries: C checks in the h1-list for whether ID1 exists. If ID1 is already in the h1-list, C has obtained the private key of signer1 and simulates the game as the real algorithm MSign (sk1,IDSet,m) using the secret key sk1=s1. Otherwise, C does not have the private key of signer1 and executes the following steps:
    • -
      C plays as signer1, and randomly chooses t1{0,1}0, broadcasting t1 to other signers. C also waits to receive t2,t3,,tn from others; it randomly selects w{0,1} and u1ZN*, and calculates
      R1=u13(1)cID1,2·acID1,1·h1(ID1)w (5)
      If R1 already exists in the h2-list, C stops. Otherwise, C sets (R1,t1) in the h2-list. C looks up Ri such that (Ri,ti) where 2in. If for some i the record is found, C also stops. Otherwise, C calculates R=i=1nRi(modN) and sets h3(RSm)=w, or stops if the entry has already existed.
    • -
      C sends R1 to other signers. After receiving R2,,Rn from the signers, C verifies that h2(Ri)=?ti. C ends up with the protocol if one of these does not satisfy this, which means A has to guess the results of the hash value. If RiRi for some i, C stops. C sends ui to the signers, receives u2,u3,,un, and calculates u=i=1nui(modN). Finally, C sends mσ=(w,u) to A.

At the end of the game, A generates a multi-signature mσ*=(w*,u*) on message m*. C calculates

R*(u*)3i=1n(1)cIDi*,2acIDi*,1h1(IDi*)w* (6)

and makes an additional query h3(R*IDSet*m*). We let UIDSet*={ID1*,ID2*,,IDn*} denote the honest IDSet, that is, A never compromised. If A succeeded in forgery, that is,

  • MVerify (mpk,IDSet*,m*,σ*)=1

  • U

  • A has never queried (IDSet*,m*) to the signature oracle then C checks the h1-list. If the multi-signature is valid, we can obtain
    u*3R*i=1n(1)cIDi,2acIDi,1h1(IDi*)w*R*i=1nsi*3w*(modN) (7)

We let s*i=1n(si*)3(modN) and produce (s*,σ*).

To factor N by applying the rewinding technique, C plays with A once again using the random tapes, which are the same as for the first time. Because C previously recorded the transcripts, C obtains the same results for A’s queries.

When A queries for h3, C randomly selects an alternative answer w instead of w, as, in the second run, the h1- and h2-query are equal to those of the first round.

C generates (s,mσ) and (s,mσ) such that

u3Rswandu3Rsw

By R=R, m=m and s=s, we have

uu3s(ww)(modN) (8)

Because ww{0,1}0 and 0<, we can obtain |ww|<3. According to Theorem 2, C can calculate a cubic root s˜ where s˜3=s. Meanwhile, C checks the h1-list to search for an entry in which IDiIDSet and calculates s¯=iIDSetsi31.

Therefore, s˜3s¯3s(modN). If s¯s˜(modN), N can be factored by Theorem 1. Otherwise, C cannot factor N. The probability that s˜s¯(modN) is 2/3.

Finally, we calculate the probability that C returns a valid result. Because most of the simulation game is similar to in [6], we set ϵ, ϵ and ϵ* as the probability to factor N by C, the probability to forge a multi-signature in practice by A and the probability to succeed in the first run before the rewinding technique by A, respectively.

We have

ϵ*ϵqS(qH+nqS)2N(qH+nqS)22N+12qS(qH+qS)2NnqS20 (9)

Furthermore, according to the forking lemma [32], we can easily obtain

frkϵ*ϵ*qH12ϵ*2qH+112 (10)

The probability that C succeeds to factor N is

ϵ23·frk2ϵ*23(qH+1)13·212ϵ23(qH+1)2nqSqH+n2qS2+qH22R·(qH+1)+nqS201ϵ13·21 (11)

5. Concrete Construction of IBMSCR−2

Inspired by the related work [24,26,29], we give a more efficient IBMS construction (named IBMSCR−2), whose computational overhead in MSign and MVerify is much lower than for those in IBMSCR−1.

5.1. Construction

  • Setup (k,): Given the security parameters, Setup can be executed as follows.

    • (1)

      KGC chooses random primes p and q where p2(mod3) and q4 or 7(mod9), and calculates the product N=p·q.

    • (2)

      A non-cubic residue a is selected such that aq=1.

    • (3)
      Several computational parameters are computed:
      η=[q1(mod9)]/3λ=η(mod2)+1β=(q1)/3ξ=aηβ(modq)
    • (4)

      Three hash functions h1,h2 and h3 are picked up, where h1:{0,1}*ZN*, h2,h3:{0,1}*{0,1}.

Finally, the algorithm Setup outputs msk=(p,q,β) and mpk=(N,h1,h2,h3,a,η,λ). KGC keeps msk secretly.

  • Extra (mpk,msk,ID): KGC computes sk as follows:
    • (1)
      KGC computes ω=h1(ID)λβ(modq) and set sa symbol cID according to ω and ξ:
      cID=0,if ω=11,if ω=ξ2,if ω=ξ2
      KGC denotes I=acID·h1(ID)(modN).
    • (2)
      KGC calculates
      sk=I2η(p1)(q1)39(modN) (12)
      and securely distributes sk to the signer. We have ski3·Ii1(modN). Following this, we denote the identity by IDi˜={IDi,cIDi}.
  • Sign and verify: These two algorithms can be derived from [29].

  • MSign (mpk,sk1,m,IDSet): Given the MS1’s private key sk1, the message m and the identity set IDSet={ID1˜,ID2˜,...,IDn˜}, MS1 executes the following algorithm in Algorithm 2. MSign generates the multi-signature mσ=(w,u).

  • MVerify (mpk,IDSet,m,mσ). The algorithm verifies by the following three steps:
    • (1)
      For i=1,2,...,n, it computes Ii=acIDi·h1(IDi).
    • (2)
      It computes R^=u3·i=1nIiw(modN).
    • (3)
      It checks whether
      w=h3(R^IDSetm) (13)
      is satisfied. If Equation (13) is satisfied, MVerify returns 1. This means mσ is valid. Otherwise MVerify returns 0.
Algorithm 2: The MSign algorithm in IBMSCR−2.
Input: the master public key mpk, the private key sk, the identity set IDSet, the message to be signed m;
Output: a multi-signature mσ.
  1. Each MSi randomly selects riZN* and calculates Ri=ri3(modN) and ti=h2(Ri).
  2. Each MSi broadcasts ti to co-signers MSj (ji).
  3. After obtaining ti from MSi, MS1 broadcasts R1 to other MSi.
  4. After receiving Ri from other signers, MS1 checks whether ti=h2(Ri) for 2in is satisfied.
  5. If one of these fails, the algorithm stops, which means the attackers have mixed invalid partial signatures. Otherwise, MS1 sets R=i=1nRi(modN), w=h3(RIDSetm), and u1=r1·sk1w(modN).
  6. S1 broadcasts u1 to other MSi.
  7. After receiving ui from MSi, MS1 aggregates these by u=i=1nui(modN).
  8. Each MSi locally generates a multi-signature mσ=(w,u).
Return mσ;

5.2. Correctness

The correctness is as follows:

u3·i=1nIiwi=1nui3Iiwi=1nri3·(ski3·Ii)wi=1nRiR(modN)

5.3. Security Proof

IBMSCR−2 is secure under the factorization in the random oracle model.

Theorem 7.

If integer factorization is (t,ϵ)-hard, our IBMSCR−2 scheme is (t,qH,qE,qS,n,ϵ)-secure against existential forgery in the random oracle model.

Because most of the simulation game between A and C is the same, we give the security proof simply.

Proof. 

When it is given an integer factorization instance N, C returns p or q if A succeeds in forging a multi-signature.

C sends mpk={N,h1,h2,h3,a,η,λ} to A. C maintains several lists (listh1, listh2, listh3, listS).

  • h1-Query. C manages a list (ID,c,h1,s). C sends h1 to A if ID exists when A queries the hash value of ID. Otherwise, C randomly selects sZN* and c{0,1,2}, sets h1s3/ac(modN), returns h1, and adds (ID,c,h1,s) to listh1.

  • The h2-query, h3-query and extraction query are similar to IBMSCR−1.

  • The multi-signature query is similar to IBMSCR−1, except that Equation (5) changes to
    R1=u13i=1nacIDi·h1(ID1)w* (14)

At the end of the game, A forges mσ*=(w*,u*) with IDSet* on m*. C calculates

R*(u*)3i=1nacIDi*·h1(IDi*)w* (15)

and queries h3(R*IDSet*m*) to the hash oracle. If the forgery is valid, we obtain that

u*3R*i=1nacIDi*·h1(IDi*)w*R*i=1nsi*3w*R*s*w*(modN) (16)

because s*i=1n(si*)3(modN). C returns (s*,w*,u*).

We also apply the rewinding technique to factor N. At last, C obtains (s,w,u) and (s,w,u) such that

u3Rswandu3Rsw (17)

Because R=R, m=m, and s=s, we have

uu3s(ww)(modN) (18)

Because ww, two cases emerge:

  • If ww1(mod3), we denote ww=3k+1 for an integer k. Therefore, suu·sk3, that is, s˜=uu·sk satisfies s˜3s(modN).

  • If ww1(mod3), we denote ww=3k1 for an integer k. Therefore, s(u·sku)3, that is, s˜=u·sku satisfies s˜3s(modN).

From the discussion above, C calculates a cubic root s˜ where s˜3=s. Meanwhile C searches the entries in the h1-list where IDiIDSet and calculates s¯=iIDSetsi3. Therefore, we have s˜3s¯3s(modN). If s¯s˜(modN), we can factor N by Theorem 1 with a probability that s˜s¯(modN) of 2/3.

Thus, we have finished the proof. ☐

6. Performance Comparisons

The comparison of security assumptions for related works are given in Table 1. These schemes are provably secure on the basis of different hardness assumptions (such as CDH, DL, RSA, quadratic residues, and cubic residues). The aim of these schemes is to find new constructions under simpler hardness assumptions.

Table 1.

The comparison of related work on the security assumptions.

Schemes The Underlying Mathematical Assumptions
[15] Computational Diffie-Hellman (CDH)
[19] Discrete Logarithm (DL)
[20] RSA
[6] Quadratic Residues
IBMSCR-1 Cubic Residues
IBMSCR-2 Cubic Residues

We denote Mp, Hm, Op and En as the operation of scalar multiplication, map-to-point hash function, bilinear pairing, and modular exponentiation, respectively. We ran each of the above operations in a personal computer and used their times from [33] to calculate the total computational cost in the running time (milliseconds), as shown in the columns of Table 2.

Table 2.

The comparison of related work of IBMS on the computational performance.

Schemes Extract Sign Verify Total Time Length
[15] 2Hm + 2Mp 1Hm + 4Mp 3Op 107.52 2 |g|
[19] 1En 2En 2En 26.55 +|N|
[20] 1En 2En 2En 26.55 +2|N|
[6] 1En 2En 2En 26.55 +|N|
IBMSCR-1 1En 2En 2En 26.55 +|N|
IBMSCR-2 2En 1En 1En 21.24 +|N|

We have also compared related works on the basis of the cubic residues for the computational performance evaluation in Table 3. For consistency, we used the modular exponentiation times to evaluate the Sign and Verify algorithms.

Table 3.

The comparison of related work on computational performance based on the cubic residues.

Schemes Underlying Cryptographic Primitive Sign Verify Total Time
[28] IBMPS 3En 3En 6En
[26] IBPMS 1En 3En 4En
[29] IBMPMS 3En 3En 6En
IBMSCR-1 IBMS 2En 2En 4En
IBMSCR-2 IBMS 1En 1En 2En

7. Conclusions

Data authenticated aggregation is always a significant issue for marine WSNs. Most data authenticated aggregation is based on the multi-signature, which relies on the technique of bilinear pairing involving heavy computational overhead or the management of certificates beyond marine wireless sensors. We have constructed two efficient IBMS schemes (IBMSCR−1 and IBMSCR−2) based on cubic residues, which are much more suitable for data authenticated aggregation in marine WSNs. Without employing the heavy overload of a bilinear pairing technique, our schemes have been designed efficiently. Our schemes have been proven to be secure under chosen identity attacks and chosen message attacks, relying only on the hardness of the integer factorization assumptions.

Acknowledgments

This work was supported by the Natural Science Foundation of China (NSFC grant nos. 61402282, 61672339 and 41671431), the Shanghai Youth Talent Development Program (grant no. 14YF1410400), and the Shanghai Local University Capacity Enhancement Program (grant no. 15590501900).

Author Contributions

The work was conducted under the cooperation of authors. Lifei Wei conceived the scheme 1, and wrote the partial paper; Lei Zhang conceived the scheme 2 and wrote the partial paper, Dongmei Huang guided the study and reviewed the manuscript; Kai Zhang conceived the security proof and wrote the partial paper; Liang Dai gave the figures and verified the results; Guojian Wu introduced the background of marine sensor networks.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  • 1.Bosman H., Iacca G., Tejada A., Wortche H.J., Liotta A. Spatial anomaly detection in sensor networks using neighborhood information. Inform. Fusion J. 2017;33:41–56. doi: 10.1016/j.inffus.2016.04.007. [DOI] [Google Scholar]
  • 2.Bosman H., Iacca G., Tejada A., Wortche H.J., Liotta A. Ensembles of incremental learners to detect anomalies in ad hoc sensor networks. Ad Hoc Netw. 2015;35:14–36. doi: 10.1016/j.adhoc.2015.07.013. [DOI] [Google Scholar]
  • 3.Ahn J., Green M., Hohenberger S. Synchronized aggregate signatures: New definitions, constructions and applications; Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010); Chicago, IL, USA. 4–8 October 2010. [Google Scholar]
  • 4.Wei L., Zhang L., Huang D., Zhang K. Efficient and Provably Secure Identity-based Multi-Signature Schemes for Data Aggregation in Marine Wireless Sensor Networks; Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control (ICNSC 2017); Calabria, Italy. 16–18 May 2017. [Google Scholar]
  • 5.Huang D., Zhao D., Wei L., Wang Z., Du Y. Modeling and analysis in marine big data: Advances and challenges. Math. Probl. Eng. 2015;2015:1–13. doi: 10.1155/2015/384742. [DOI] [Google Scholar]
  • 6.Wei L., Cao Z., Dong X. Secure identity-based multisignature schemes under quadratic residue assumptions. Secur. Commun. Netw. 2013;6:689–701. doi: 10.1002/sec.600. [DOI] [Google Scholar]
  • 7.Hsiao H., Studer A., Chen C., Perrig A., Bai F., Bellur B., Iyer A. Flooding-resilient broadcast authentication for vanets; Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MOBICOM 2011); Las Vegas, NV, USA. 20–22 September 2011. [Google Scholar]
  • 8.Itakura K., Nakamura K. A public-key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 1983;71:1–8. [Google Scholar]
  • 9.Barr K.C., Asanovic K. Energy-aware lossless data compression. ACM Trans. Comput. Syst. 2006;24:250–291. doi: 10.1145/1151690.1151692. [DOI] [Google Scholar]
  • 10.Bagherzandi A., Cheon J., Jarecki S. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma; Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008); Alexandria, VA, USA. 27–31 October 2008. [Google Scholar]
  • 11.Ma C., Weng J., Li Y., Deng R. Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr. 2010;54:121–133. doi: 10.1007/s10623-009-9313-z. [DOI] [Google Scholar]
  • 12.Shamir A. Identity-based cryptosystems and signature schemes; Proceedings of the 4th International Cryptology Conference (CRYPTO 1984); Santa Barbara, CA, USA. 19–22 August 1984. [Google Scholar]
  • 13.Boneh D., Franklin M. Identity-based encryption from the Weil pairing. SIAM J. Comput. 2003;32:586–615. [Google Scholar]
  • 14.Cocks C. An Identity Based Encryption Scheme Based on Quadratic Residues; Proceedings of the 8th IMA International Conference on Cryptography and Coding; Cirencester, UK. 17–19 December 2001. [Google Scholar]
  • 15.Gentry C., Ramzan Z. Identity-based aggregate signatures; Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC 2006); New York, NY, USA. 24–26 April 2006. [Google Scholar]
  • 16.Lu R., Lin X., Zhu H., Liang X., Shen X. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2012;23:32–43. [Google Scholar]
  • 17.Zhang K., Wei L., Li X., Qian H. Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks; Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017); Guilin, China. 19–21 June 2017. [Google Scholar]
  • 18.Lu Y., Li J. A Pairing-Free Certificate-Based Proxy Re-encryption Scheme for Secure Data Sharing in Public Clouds. Future Gener. Comput. Syst. 2016;62:140–147. doi: 10.1016/j.future.2015.11.012. [DOI] [Google Scholar]
  • 19.Bellare M., Neven G. Identity-Based Multi-signatures from RSA; Proceedings of the Cryptographers Track at the RSA Conference (CT-RSA 2007); San Francisco, CA, USA. 5–9 February 2007. [Google Scholar]
  • 20.Bagherzandi A., Jarecki S. Identity-Based Aggregate and Multi-Signature Schemes Based on RSA; Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010); Paris, France. 26–28 May 2010; pp. 480–498. [Google Scholar]
  • 21.Yang F., Lo J., Liao C. Improving an efficient id-based rsa multisignature. J. Ambient Intell. Hum. Comput. 2011;4:249–254. doi: 10.1007/s12652-011-0093-8. [DOI] [Google Scholar]
  • 22.Chai Z., Cao Z., Dong X. Identity-based signature scheme based on quadratic residues. Sci. China Inform. Sci. 2007;50:373–380. doi: 10.1007/s11432-007-0038-1. [DOI] [Google Scholar]
  • 23.Xing D., Cao Z., Dong X. Identity based signature scheme based on cubic residues. Sci. China Inform. Sci. 2011;54:2001–2012. doi: 10.1007/s11432-011-4413-6. [DOI] [Google Scholar]
  • 24.Wang Z., Wang L., Zheng S., Yang Y., Hu Z. Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 2012;14:33–38. [Google Scholar]
  • 25.Wang F., Lin C. Secure and efficient identity-based proxy multisignature using cubic residues. J. Univ. Electr. Sci. Technol. China. 2013;42:778–783. [Google Scholar]
  • 26.Wang F., Chang C.-C., Lin C., Chang S.-C. Secure and efficient identity-based proxy multi-signature using cubic residues. Int. J. Netw. Secur. 2016;18:90–98. [Google Scholar]
  • 27.Wang F., Lin C., Lian G. Efficient identtiy based threshold ring signature based on cubic residues. J. Wuhan Univ. (Nat. Sci.) 2013;59:75–81. [Google Scholar]
  • 28.Wei L., Zhang L., Zhang K., Dong M. An Efficient and Secure Delegated Multi-Authentication Protocol for Mobile Data Owners in Cloud; Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA15); Qufu, China. 10–12 August 2015. [Google Scholar]
  • 29.Zhang L., Wei L., Huang D., Zhang K., Dong M., Ota K. Medaps: Secure multi-entities delegated authentication protocols for mobile cloud computing. Secur. Commun. Netw. 2016;9:3777–3789. doi: 10.1002/sec.1490. [DOI] [Google Scholar]
  • 30.Damgard I., Frandsen G. Efficient algorithms for gcd and cubic residuosity in the ring of Eisenstein integers. J. Symb. Comput. 2005;39:643–652. doi: 10.1016/j.jsc.2004.02.006. [DOI] [Google Scholar]
  • 31.Benhamouda F., Herranz J., Joye M., Libert B. Efficient cryptosystems from 2k. J. Cryptol. 2016:1–31. [Google Scholar]
  • 32.Coron J. On the exact security of full domain hash; Proceedings of the 20th Annual International Cryptology Conference (CRYPTO 2000); Santa Barbara, CA, USA. 20–24 August 2000. [Google Scholar]
  • 33.He D., Chen J., Zhang R. An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 2012;25:1432–1442. doi: 10.1002/dac.1330. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES