LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT
Abstract
1. Introduction
- (1)
- We design the LCP-CAS scheme, which integrates a disordered aggregation algorithm, a conditional privacy-preserving mechanism, and lattice-based cryptography into a unified framework. This design not only guarantees quantum-resistant security but also significantly enhances privacy protection for industrial IoT systems.
- (2)
- We provide a provable security analysis showing that LCP-CAS is secure against adaptive chosen-message attacks and collusion attacks by three types of adversaries (A1, A2, and A3) in the random oracle model. The scheme satisfies industrial security requirements, including integrity, non-repudiation, conditional privacy preservation, and forward secrecy.
- (3)
- We implement LCP-CAS and conduct comparative experiments against four state-of-the-art lattice-based aggregate signature schemes. The results show that, for the aggregation of 100 signatures, the proposed scheme achieves an average aggregation time of 143 ms and a verification time of 232 ms, with verification efficiency improved by up to 30.7 times. Furthermore, the scheme maintains linear scalability with graceful performance degradation as the number of aggregated signatures increases, thereby meeting the real-time requirements of large-scale industrial IoT deployments.
2. Preliminaries
2.1. Notations
2.2. Hardness Assumption
- 1.
- Uniform distribution over ;
- 2.
- The distribution , where is uniform in , and are uniform in
2.3. Rejection Sampling
- 1.
- Sample , then output with probability
- 2.
- Sample , then output with probability
2.4. Certificateless Aggregate Signature
3. System Model and Security Model
3.1. System Model
3.2. Security Model
- Partial Private Key Generation Oracle (Ora-psk): The challenger C generates the partial private key of the user requested by the adversary A by executing the Partial-secret-key-generate algorithm.
- Secret Value Generation Oracle (Ora-x): If the public key of the user has not been replaced, the challenger C may generate the secret value for the adversary A by executing the Secret-value-generate algorithm. However, if the public key of the user has been replaced, it returns (no result) directly.
- Public Key Generation Oracle (Ora-pk): When the adversary A requests the public key of a user, the challenger C generates the public key of the user by executing the Public-key-generate algorithm.
- Public Key Replacement Oracle (Ora-change): Subsequently, the adversary A replaces the public key of the target user with (the new public key, the original text does not specify the new public key, so it is retained as is); note that the Ora-x oracle must not be invoked again for the challenged user.
- Signature Query Oracle (Ora-sign): When the adversary A requests the signature of a specific message from a user, the challenger C generates the signature by executing the Sign algorithm and sends the signature to the adversary A.
4. The Proposed Scheme
4.1. System Initialization
4.2. Pseudonym Generation
4.3. Partial Private Key Generation
4.4. Generation of Complete Public–Private Key Pair
4.5. Signature Generation
4.6. Aggregate Signature Phase
4.7. Aggregate Signature Verification Phase
5. Security Analysis
5.1. Provable Security
- 1.
- System Initialization. Challenger C runs the Setup algorithm, inputs security parameter , outputs the system master private key and system master public key , and publishes and the system parameters . C maintains the following lists for queries to hash functions ; for partial private key queries; for secret value queries; for user public key queries; for signature key queries; and for signature queries. All the above lists are initially empty.
- 2.
- Queries. During the query phase, the attacker can perform corresponding query operations. Before the forgery phase, the identity randomly selected by the attacker cannot be captured by the challenger.
- (a)
- Query. Challenger C creates a query list , containing . When attacker A1 requests anonymous identity information about , challenger C queries the list . If it already exists, the challenge is aborted; if not, the corresponding pseudonym is calculated and generated as a response, and stored in the list
- (b)
- Query. Challenger C creates a query list , containing . When attacker A1 requests a signature for the message , challenger C queries the list . If the already exists, the value is directly returned to A1; otherwise, the attacker calculates the value, returns it to A1, and adds it to the list
- (c)
- Partial private key query. The challenger C creates a query list , which contains . Attacker A1 obtains the partial private key with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A1; if not, challenger C calculates and generates for A1 based on the anonymous identity information and stores it in the list
- (d)
- Secret value query. The challenger C creates a query list , which contains . Attacker A1 obtains the secret value with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A1; if not, challenger C randomly selects for A1 based on the anonymous identity information and stores it in the list
- (e)
- Public key query. The challenger C creates a query list , which contains . Attacker A1 obtains the public key with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A1; if not, challenger C calculates the user’s public key based on the partial private key and the secret value, and stores it in the list
- (f)
- Public key replacement query. The attacker selects a new public key for the identity to replace the original public key. When challenger C receives the public key replacement query from attacker A1 for the identity , is updated to
- 3.
- Forgery. Attacker A1 claims, with a non-negligible probability, to be of identity and public key , and outputs a successfully forged signature on message . When an adversary can successfully forge a new signature, according to the Forking Lemma [23], the challenger can output another valid signature on message with identity with a non-negligible probability.
- 1.
- System initialization. The challenger C runs the Setup algorithm, inputs the security parameter , and outputs the system master private key and the system master public key . Then, C publishes and the system parameters . C maintains the following lists for queries to hash functions ; for partial private key queries; for secret value queries; for user public key queries; for signature key queries; and for signature queries. All the above lists are initially empty.
- 2.
- Queries. In the query phase, the attacker can perform corresponding query operations. Before the forgery phase, the identity randomly selected by the attacker cannot be captured by the challenger.
- (a)
- query. The challenger C creates a query list , which contains . When attacker A2 requests an anonymous identity information query about , challenger C checks the list . If it already exists, the challenge is aborted; if not, the corresponding pseudonym is calculated and generated as a response, and stored in the list
- (b)
- query. The challenger C creates a query list , which contains . When attacker A2 requests a signature for message , challenger C checks the list . If Q already exists, the value is directly returned to A2; otherwise, the attacker calculates the Q value, returns it to A2, and adds it to the list
- (c)
- Partial private key query. The challenger C creates a query list , which contains . Attacker A2 obtains the partial private key with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, zi is returned to A2; if not, challenger C calculates and generates for A2 based on the anonymous identity information and stores it in the list
- (d)
- Secret value query. The challenger C creates a query list , which contains . Attacker A2 obtains the secret value with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A2; if not, challenger C randomly selects for A2 based on the anonymous identity information and stores it in the list
- (e)
- Public key query. The challenger C creates a query list , which contains . Attacker A1 obtains the public key with the identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A1; if not, challenger C calculates the user’s public key based on the partial private key and the secret value, and stores it in the list
- 3.
- Signature forgery. Given a message , the challenger C first browses to find the user’s private key , and outputs a successfully forged signature for the message . When an adversary can successfully forge a new signature, according to the Forking Lemma, the challenger can output another valid signature on the message with identity with a non-negligible probability. The above two signatures satisfy:
- 1.
- System Initialization. The challenger C runs the Setup algorithm, inputs the security parameter , and outputs the system master private key and the system master public key . Then, C publishes and the system parameters . C maintains the following lists: for queries to hash functions ; for partial private key queries; for secret value queries; for user public key queries; for signature key queries; and for signature queries. All the above lists are initially empty.
- 2.
- Queries. In the query phase, the attacker can perform corresponding query operations. Before the forgery phase, the identity randomly selected by the attacker cannot be captured by the challenger.
- (a)
- Query. The challenger C creates a query list , which contains . When attacker A3 requests an anonymous identity information query about ID, challenger C checks the list . If it already exists, the challenge is aborted; if not, the corresponding pseudonym is computed and generated as a response, and stored in the list
- (b)
- Query. The challenger C creates a query list , which contains . When attacker A3 requests a signature for message , challenger C checks the list . If already exists, the value is directly returned to A3; otherwise, the attacker computes the value, returns it to A3, and adds it to the list
- (c)
- Partial Private Key Query. The challenger C creates a query list , which contains . Attacker A3 obtains the partial private key with identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, zi is returned to A3; if not, challenger C computes and generates for A3 based on the anonymous identity information and stores it in the list
- (d)
- Secret Value Query. The challenger C creates a query list , which contains . Attacker A3 obtains the secret value with identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A3; if not, challenger C randomly selects for A3 based on the anonymous identity information and stores it in the list
- (e)
- Public Key Query. The challenger C creates a query list , which contains . Attacker A3 obtains the public key with identity by sending a query to challenger C. After receiving the query request, challenger C searches the list . If it exists, is returned to A3; if not, challenger C calculates the user’s public key based on the partial private key and the secret value, and stores it in the list
- (f)
- Signature Query: When challenger C receives a signature query from attacker A3 about identity , if exists in , is returned to the attacker; otherwise, challenger C randomly selects , calculates the signature , inserts the tuple into the list , and returns
- 3.
- Forgery. Through the above query process, under the same state information, A3 obtains the signatures of n users with identity information and corresponding public keys on different messages . Next, attacker A3 attempts to forge a valid aggregate signature . When the adversary can successfully forge a new signature, according to the Forking Lemma, the challenger can output another valid aggregate signature with a non-negligible probability.
5.2. Security Performance Analysis
5.2.1. Non-Repudiation
5.2.2. Conditional Privacy Protection
5.2.3. Unlinkability
5.2.4. Forward Security
5.2.5. Impersonation Attacks
5.2.6. Tampering Attacks
5.2.7. Replay Attacks
5.2.8. Prevention of Master Private Key Statistical Attacks
5.2.9. Resistance to Collusion Attacks
6. Performance Analysis
6.1. Security Feature Comparison
6.2. Computational Overhead Comparison
6.2.1. Theoretical Analysis
6.2.2. Experimental Analysis
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ushkov, A.N.; Strelkov, N.O.; Krutskikh, V.V.; Chernikov, A.I. Industrial Internet of Things Platform for Water Resource Monitoring. In Proceedings of the 2023 International Russian Smart Industry Conference (SmartIndustryCon), Sochi, Russia, 27–31 March 2023; pp. 593–599. [Google Scholar] [CrossRef]
- Noor, M.; Sithungu, S.; Lebea, K. An Anomaly Detection Framework for IIoT-Based Smart Farming Systems. In Intelligent Computing; Arai, K., Ed.; Springer: Cham, Switzerland, 2024; Volume 1019, pp. 396–409. [Google Scholar] [CrossRef]
- Rathee, G.; Iqbal, R.; Kerrache, C.A.; Song, H. TrustNextGen: Security aspects of trustworthy next generation industrial Internet of Things (IIoT). IEEE Internet Things J. 2024, 11, 25568–25576. [Google Scholar] [CrossRef]
- Hussain, S.; Ullah, S.S.; Ali, I.; Xie, J.; Inukollu, V.N. Certificateless signature schemes in industrial Internet of Things: A comparative survey. Comput. Commun. 2022, 181, 116–131. [Google Scholar] [CrossRef]
- Wang, W.; Xu, H.; Alazab, M.; Gadekallu, T.R. Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE Trans. Ind. Inform. 2022, 18, 7059–7067. [Google Scholar] [CrossRef]
- Feng, L.; Qiu, F.; Hu, K.; Yu, B.; Lin, J.; Yao, S. CABC: A cross-domain authentication method combining blockchain with certificateless signature for IIoT. Future Gener. Comput. Syst. 2024, 158, 516–529. [Google Scholar] [CrossRef]
- Yang, X.; Wang, W.; Tian, T.; Wang, C. Cryptanalysis and improvement of a blockchain-based certificateless signature for IIoT devices. IEEE Trans. Ind. Inform. 2024, 20, 1884–1894. [Google Scholar] [CrossRef]
- Boneh, D.; Gentry, C.; Lynn, B.; Shacham, H. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Advances in Cryptology—EUROCRYPT 2003; Biham, E., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2656, pp. 416–432. [Google Scholar] [CrossRef]
- Shor, P.W. Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS), Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar] [CrossRef]
- Grover, L.K. Quantum Mechanics Helps in Searching for a Needle in a Haystack. Phys. Rev. Lett. 1997, 79, 325–328. [Google Scholar] [CrossRef]
- Quan, Y. Improving Bitcoin’s post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on CRYSTALS-Dilithium and a STARK protocol. IEEE Access 2022, 10, 132472–132482. [Google Scholar] [CrossRef]
- Kniep, Q.; Wattenhofer, R. Byzantine fault-tolerant aggregate signatures. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2024), Singapore, 1–5 July 2024; pp. 1831–1843. [Google Scholar] [CrossRef]
- Lu, X.; Yin, W.; Wen, Q.; Jin, Z.; Li, W. A lattice-based unordered aggregate signature scheme based on the intersection method. IEEE Access 2018, 6, 33986–33999. [Google Scholar] [CrossRef]
- Boneh, D.; Kim, S. One-Time and Interactive Aggregate Signatures from Lattices. Preprint, 2020. Available online: https://crypto.stanford.edu/~skim13/agg_ots.pdf (accessed on 5 January 2026).
- Wu, W.; Ye, F. A secure and efficient certificateless aggregate signature authentication scheme with pseudonyms for VANETs. IEEE Internet Things J. 2025; in press. [Google Scholar] [CrossRef]
- Wang, X.; Xu, G.; Yu, Y. Lattice-based cryptography: A survey. Chin. Ann. Math. Ser. B 2023, 44, 945–960. [Google Scholar] [CrossRef]
- Barthe, G.; Belaïd, S.; Espitau, T.; Fouque, P.-A.; Grégoire, B.; Rossi, M.; Tibouchi, M. Masking the GLP lattice-based signature scheme at any order. J. Cryptol. 2024, 37, 5. [Google Scholar] [CrossRef]
- Deng, J.; Chen, S.; Chen, J.; Meng, W. A survey on discrete Gaussian samplers in lattice based cryptography. In Emerging Information Security and Applications; Zhou, J., Qing, S., Sun, L., Liu, Y., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2023; Volume 13964, pp. 87–107. [Google Scholar] [CrossRef]
- Lyubashevsky, V. Lattice signatures without trapdoors. In Advances in Cryptology—EUROCRYPT 2012; Pointcheval, D., Johansson, T., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7237, pp. 738–755. [Google Scholar] [CrossRef]
- Ducas, L.; Durmus, A.; Lepoint, T.; Lyubashevsky, V. Lattice signatures and bimodal Gaussians. In Advances in Cryptology—CRYPTO 2013; Canetti, R., Garay, J.A., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8042, pp. 40–56. [Google Scholar] [CrossRef]
- Verma, R.K.; Khan, A.J.; Kashyap, S.; Chande, M.K. Certificateless aggregate signatures: A comprehensive survey and comparative analysis. J. Univ. Comput. Sci. 2024, 30, 1662–1690. [Google Scholar] [CrossRef]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. In Advances in Cryptology—ASIACRYPT 2003; Laih, C.-S., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2894, pp. 452–473. [Google Scholar] [CrossRef]
- Pointcheval, D.; Stern, J. Security Arguments for Digital Signatures and Blind Signatures. J. Cryptol. 2000, 13, 361–396. [Google Scholar] [CrossRef]
- Debris-Alazard, T.; Fallahpour, P.; Stehlé, D. Quantum oblivious LWE sampling and insecurity of standard model lattice-based SNARKs. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing (STOC 2024), Vancouver, BC, Canada, 24–28 June 2024; pp. 423–434. [Google Scholar] [CrossRef]
- Xu, S.; Yu, S.; Bai, Y.J.; Yue, Z.-Y.; Liu, Y.-L. LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET. Veh. Commun. 2024, 50, 100843. [Google Scholar] [CrossRef]
- Xu, M.; Li, C. An NTRU-based certificateless aggregate signature scheme for underwater acoustic communication. IEEE Internet Things J. 2024, 11, 10031–10039. [Google Scholar] [CrossRef]
- Bagchi, P.; Maheshwari, R.; Bera, B.; Das, A.K.; Park, Y.; Lorenz, P. Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for Internet of drones applications. IEEE Trans. Veh. Technol. 2023, 72, 10393–10408. [Google Scholar] [CrossRef]
- Dong, S.; Yao, Y.; Zhou, Y.; Yang, Y. A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system. Peer-to-Peer Netw. Appl. 2024, 17, 284–296. [Google Scholar] [CrossRef]





| Characteristic | Type-I Adversary | Type-II Adversary | Type-III Adversary |
|---|---|---|---|
| Access to System Master Key | No | Yes | Yes |
| Replace User Public Keys | Yes | No | No |
| Compute User Partial Key | No | Yes | Yes |
| Attack Goal | Forge a Signature | Forge a Signature | Forge an Aggregate Signature |
| Notation | Description |
|---|---|
| Polynomial degree | |
| Prime number | |
| Standard deviation for discrete Gaussian samplers | |
| KGC’s random Gaussian sample used in pseudonym/partial-key generation | |
| k | Security parameter |
| Public parameters | |
| Device identity information | |
| Device pseudonym | |
| Message to be signed | |
| Pseudonym validity period | |
| System master public key | |
| System master private key | |
| Device public key | |
| Device private key | |
| Aggregation node public key | |
| Aggregation node private key | |
| Aggregate intermediate commitments | |
| Device partial private key | |
| Device secret value | |
| Individual signature | |
| Aggregate signature |
| Scheme [25] | Scheme [26] | Scheme [27] | Scheme [28] | Our Scheme | |
|---|---|---|---|---|---|
| Non-Repudiation | √ | √ | √ | √ | √ |
| Unlinkability | √ | √ | × | × | √ |
| Conditional Privacy | √ | √ | × | × | √ |
| No Key Escrow | √ | √ | × | √ | √ |
| Impersonation Attacks | √ | √ | √ | √ | √ |
| Statistical Attacks | × | × | × | × | √ |
| Replay Attacks | √ | √ | × | × | √ |
| Tampering Attacks | √ | √ | √ | √ | √ |
| Forward Security | √ | × | × | × | √ |
| Post-Quantum Security | √ | √ | √ | √ | √ |
| Notation | Description |
|---|---|
| Hash operation | |
| Vector addition | |
| Vector subtraction | |
| Polynomial ring sampling | |
| Matrix intersection computation | |
| Matrix-vector multiplication | |
| Polynomial ring multiplication | |
| Polynomial ring addition | |
| Polynomial ring subtraction | |
| Gaussian sampling | |
| Modular operation | |
| High/Low-bit extraction |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Shi, L.; Chen, Z.; Zhang, Z.; Chen, P.; Chen, L. LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT. Entropy 2026, 28, 258. https://doi.org/10.3390/e28030258
Shi L, Chen Z, Zhang Z, Chen P, Chen L. LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT. Entropy. 2026; 28(3):258. https://doi.org/10.3390/e28030258
Chicago/Turabian StyleShi, Lin, Ziyi Chen, Ziyan Zhang, Pan Chen, and Liquan Chen. 2026. "LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT" Entropy 28, no. 3: 258. https://doi.org/10.3390/e28030258
APA StyleShi, L., Chen, Z., Zhang, Z., Chen, P., & Chen, L. (2026). LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT. Entropy, 28(3), 258. https://doi.org/10.3390/e28030258

