Skip to main content
Erschienen in: Journal of Medical Systems 5/2020

01.05.2020 | Systems-Level Quality Improvement

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

verfasst von: Zhiyan Xu, Debiao He, Pandi Vijayakumar, Kim-Kwang Raymond Choo, Li Li

Erschienen in: Journal of Medical Systems | Ausgabe 5/2020

Einloggen, um Zugang zu erhalten

Abstract

An electronic health (e-health) system, such as a medical cyber-physical system, offers a number of benefits (e.g. inform medical diagnosis). There are, however, a number of considerations in the implementation of the medical cyber-physical system, such as the integrity of medical / healthcare data (e.g. manipulated data can result in misdiagnosis). A number of digital signature schemes have been proposed in recent years to mitigate some of these challenges. However, the security of existing signatures is mostly based on conventional difficult mathematical problems, which are known to be insecure against quantum attacks. In this paper, we propose a certificateless signature scheme, based on NTRU lattice. The latter is based on the difficulty of small integer solutions on the NTRU lattice, and is known to be quantum attack resilience. Security analysis and performance evaluations demonstrate that our proposed scheme achieves significantly reduced communication and computation costs in comparison to two other competing quantum resilience schemes, while being quantum attack resilience.
Literatur
1.
Zurück zum Zitat Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE
2.
Zurück zum Zitat Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999CrossRef Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999CrossRef
3.
Zurück zum Zitat Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics
4.
Zurück zum Zitat Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365 Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365
5.
Zurück zum Zitat Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018CrossRef Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018CrossRef
6.
Zurück zum Zitat Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019CrossRef Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019CrossRef
7.
Zurück zum Zitat Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015CrossRef Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015CrossRef
8.
Zurück zum Zitat Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016 Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016
9.
Zurück zum Zitat Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018CrossRef Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018CrossRef
10.
Zurück zum Zitat Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61 Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61
11.
Zurück zum Zitat Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer
12.
Zurück zum Zitat Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018CrossRef Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018CrossRef
13.
Zurück zum Zitat Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM
14.
Zurück zum Zitat Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer
15.
Zurück zum Zitat Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer
16.
Zurück zum Zitat Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer
17.
Zurück zum Zitat Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer
18.
Zurück zum Zitat Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer
19.
Zurück zum Zitat Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer
20.
Zurück zum Zitat Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM
21.
Zurück zum Zitat Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer
22.
Zurück zum Zitat Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer
23.
Zurück zum Zitat Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer
24.
Zurück zum Zitat Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer
25.
Zurück zum Zitat Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer
26.
Zurück zum Zitat Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer
27.
Zurück zum Zitat Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer
28.
Zurück zum Zitat Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011 Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011
29.
Zurück zum Zitat Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014CrossRef Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014CrossRef
Metadaten
Titel
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems
verfasst von
Zhiyan Xu
Debiao He
Pandi Vijayakumar
Kim-Kwang Raymond Choo
Li Li
Publikationsdatum
01.05.2020
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2020
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-020-1527-7

Weitere Artikel der Ausgabe 5/2020

Journal of Medical Systems 5/2020 Zur Ausgabe