Next Article in Journal
The Effect of Selected Operational Factors on the Vibroactivity of Upper Gearbox Housings Made of Composite Materials
Next Article in Special Issue
Privacy Engineering for Domestic IoT: Enabling Due Diligence
Previous Article in Journal
An Energy-Efficient Routing Protocol for Reliable Data Transmission in Wireless Body Area Networks
Previous Article in Special Issue
Identity-Based Encryption with Filtered Equality Test for Smart City Applications
Article

An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things

by 1,2,3, 1,2,*, 1,2, 1,2, 3 and 3,4
1
School of Computer and Information, Anhui Normal University, Wuhu 241002, China
2
Anhui Provincial Key Lab of Network and Information Security, Wuhu 241002, China
3
School of Mathematics and Computer, Tongling University, Tongling 244061, China
4
Institute of Information Technology & Engineering Management, Tongling University, Tongling 244061, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(19), 4239; https://doi.org/10.3390/s19194239
Received: 5 August 2019 / Revised: 15 September 2019 / Accepted: 27 September 2019 / Published: 29 September 2019
(This article belongs to the Special Issue Security and Privacy in Internet of Things)
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications. In order to solve the issues of bandwidth limitation and computational efficiency of secure communication in IoT applications, an aggregate signature scheme based on multi- trapdoor hash function is proposed in this paper. Firstly, to prevent key exposition, based on the elliptic curve discrete logarithm problem (ECDLP), we constructed a double trapdoor hash function (DTH) and proved its reliability. Secondly, the multi-trapdoor hash function (MTH) based on DTH is presented. Finally, an MTH-based aggregate signature scheme (MTH-AS) with constant signature length is proposed. Based on the assumption of ECDLP, the proposed scheme is proven unforgeable against adaptive chosen message attacks with the Forking Lemma. Different from the most signature schemes with bilinear mapping, the proposed scheme has higher computational efficiency and shorter aggregate signature length. Moreover, it is independent of the number of signers. Security analysis and performance evaluation has revealed that the proposed scheme is an ideal solution for secure IoT applications with limited computing power, storage capacity, or limited bandwidth, such as wireless sensor networks, vehicular ad hoc networks, or healthcare sensor networks. View Full-Text
Keywords: Internet of Things (IoT); aggregate signature; trapdoor hash function; elliptic curve discrete logarithm; random oracle model Internet of Things (IoT); aggregate signature; trapdoor hash function; elliptic curve discrete logarithm; random oracle model
Show Figures

Graphical abstract

MDPI and ACS Style

Shu, H.; Chen, F.; Xie, D.; Sun, L.; Qi, P.; Huang, Y. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things. Sensors 2019, 19, 4239. https://doi.org/10.3390/s19194239

AMA Style

Shu H, Chen F, Xie D, Sun L, Qi P, Huang Y. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things. Sensors. 2019; 19(19):4239. https://doi.org/10.3390/s19194239

Chicago/Turabian Style

Shu, Hong; Chen, Fulong; Xie, Dong; Sun, Liping; Qi, Ping; Huang, Yongqing. 2019. "An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things" Sensors 19, no. 19: 4239. https://doi.org/10.3390/s19194239

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop