You are currently on the new version of our website. Access the old version .
SensorsSensors
  • Article
  • Open Access

8 March 2021

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE

,
,
,
,
,
,
and
1
School of Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi 110067, India
2
Department of Computer Science, Clifton Campus, Nottingham Trent University, Nottingham NG11 8NS, UK
3
Department of Mobile Computing, Amman Arab University, Amman 11953, Jordan
4
Integrated Management Coastal Research Institute, Universitat Politecnica de Valencia, 46022 Valencia, Spain
This article belongs to the Special Issue Physical Layer Security for Sensor Enabled Heterogeneous Networks

Abstract

Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.

1. Introduction

The Internet of Everything (IoE) is an interconnection of smart devices, business processes and data structures without any human intervention [1]. It expands applications from digital sensor tools to smart and self-configuring intelligent nodes in distributed hardware to enrich the lives of people [2]. In such smart networks, information security is of paramount importance as all the decisions and actions depend on the accuracy and credibility of the received data [3]. The public key infrastructure (PKI) plays a critical role in information security. In PKI, however, both the sender and the receiver authenticate each other with the help of certificates obtained from the certificate authority. This process can be time-consuming and complex. Identity-based cryptography (IBC) schemes remove these barriers and use public strings such as email addresses or domain names for data encryption and signature verification, instead of digital certificates [4]. The security of IBC depends on solving some mathematical problems such as integer factorization and discrete logarithms. Major recent signature schemes depend on these two mathematical problems, which are infeasible to solve on any classical computer. However, these problems can easily be solved by quantum computers in polynomial time. For instance, Shor’s quantum algorithm can solve the integer factorization in polynomial time [5]. Moreover, it can not only forge a signature but also recover private keys. Thus, such system poses serious threats to the modern cryptography. To effectively block these threads, many cryptographers are developing new quantum-resistant algorithms that are unbreakable in the era of quantum computers. Several postquantum cryptography (PQC) classes have been proposed which are currently believed to be quantum resistant, namely: lattice-based [6,7,8], hash-based [9], code-based PQC [10] and isogeny-based [11].
Over the past few years, isogeny-based cryptography has been gaining a lot of momentum owing to its small key sizes. Various isogeny-based cryptosystems have been published for public key encryption and key exchange protocols [12,13] but later have been broken by a subexponential quantum attack. Recently, a key exchange scheme based on supersingular isogeny Diffie–Hellman (SIDH) has been proposed, for which there is no known subexponential quantum attack [14] and is much faster than ordinary isogeny. SIDH uses supersingular elliptic curves for key exchange and public key encryption [15,16]. Isogeny-based cryptosystems have also been used for digital signatures such as the strong designated verifier signature [17] and the undeniable signature [18]. However, the feasibility of these schemes on resource-constrained devices is not known. The compressed digital signature scheme reduces the public and private key sizes to 336 and 48 bytes, respectively, for the 128-bit quantum security level. Unfortunately, these primary signature schemes are slower than other quantum signature techniques due to their larger signature sizes.
The prime issues in security by green computing for IoE applications are related to the key size, signature and the encryption computation of the postquantum based cryptosystems, which must be kept compact to reduce energy consumption and computation time [19]. Most postquantum based cryptosystems require higher order of magnitude longer keys to provide current the level of protection, which are substantial enough to impact energy requirements and computation time [20]. The use of isogeny curve based postquantum cryptography is considered to be the most practicable solution to the energy required for the shortest key’s computation. To efficiently exploit the resistant capability of postquantum cryptography, we use a supersingular isogeny curve and ID-based signature for postquantum cryptography, which requires much shorter keys to maintain the same level of protection and provides user friendly access to the system. In addition to this, it can also reduce the overall energy and time needed for the crypto operations in comparison to postquantum based cryptosystems and therefore facilitate appropriate replacement in sensors, handheld devices, and IoE applications.
In this context, a lightweight postquantum ID-based signature (LPQS) scheme using a supersingular isogeny curve for secure data transmission in the IoE environment is presented. The design of the LPQS scheme aims to provide a signature scheme for the postquantum cryptography and to reduce the complexity of the system with the consumption of fewer system resources. The LPQS scheme uses the identity of the client for the initialization of the process. Further, this scheme uses two isogeny curves for verification to provide double-fold secure encryption. The main contributions of the scheme can be summarized as:
  • Firstly, a system model for post quantum security is presented considering its applicability in IoE environments.
  • Secondly, the four phases of the execution of the proposed framework LPQS are detailed, where compressed curves are used to reduce the size of keys and the validation of the signature depends on the commutative property of curves.
  • Thirdly, the unforgeability of LPQS under an adaptively chosen message attack is proved and security analysis is performed to show its resistance against various cyberattacks.
  • Finally, performance analysis and experimental validation of the proposed framework are performed under software simulation environment to assess its lightweight performance in realistic IoE environments considering the embedded nodes.
The rest of the paper is organized as follows. Section 2 presents the recent review of nonquantum and postquantum cryptographic techniques. Section 3 presents the details of the proposed lightweight security framework LPQS. In Section 4 discusses security analysis and experimental comparative performance evaluation considering range of metrics, followed by conclusions presented in Section 5.

3. Lightweight Postquantum Signature Scheme for IoE

3.1. Preliminaries—Basics of Supersingular Iosgency Curve

Initially, we briefly introduce the supersingular isogeny curve that has been used to design the proposed signature scheme and its problems to prove its resistance against cyberattacks. We consider two elliptic curves E A ,   E B over a finite field   F q also used in [36,37]. An isogeny φ: E A E B is a nonconstant morphism that preserves the group structure [38]. The degree of an isogeny φ is equal to the degree of φ as a morphism. An isogeny of degree ℓ is called a ℓ-isogeny [39,40]. If φ is separable, then deg φ = #ker φ. If isogeny is separable between two curves, we say that they are isogenous [41]. Tate’s theorem [42,43] is that two curves E A , E B over F q are isogenous if and only if   # E A ( F q ) = # E B ( F q ) . An isogeny can be identified by its kernel in such a way that for every finite subgroup G of   E A , there is a unique E B and a separable isogeny φ: E A E B with kernel G such that φ: E B E A / G . To obtain subgroup G we can use Vélu’s formulae.
Isogenies with the same domain and range are called as endomorphisms. The set of endomorphisms is maximal order either to quaternion algebra or to an imaginary quadratic field. The curve is supersingular for the first case; otherwise, the curve is ordinary. In the case of a supersingular elliptic curve, there is always a curve in the isomorphism class defined over F p 2 , thus its j-invariant is over F p 2 . One can construct a so-called isogeny graph for any prime       p , where an edge and vertex are associated with an l-isogeny and j-invariant, respectively. Next, we present a few hard problems related to supersingular elliptic curves over F p 2 .
Problem 1 (computational supersingular isogeny ( C S S I A ) problem): suppose Φ A :   E 0 E A to be an isogeny with kernel ( P A + α Q A ) where α chose at random from ᴢ/ l A e A z and not divisible by l A . Find a generator G A of ( P A + α Q A ) where   E A ,   Φ A P C ,   Φ A Q C is given.
Problem 2 (computational supersingular isogeny ( C S S I C ) problem): suppose Φ C :   E 0 E C to be an isogeny with kernel ( P C + β Q C ) where β chose at random from ᴢ/ l C e C z and not divisible by l C . Find a generator G C of ( P C + β Q C ) where   E C ,   Φ C P A ,   Φ C Q A is given.
Problem 3 (supersingular isogeny Diffie–Hellman (SIDH) problem): let Φ A :   E 0 E A be an isogeny with kernel P A + α Q A , and Φ C :   E 0 E C be an isogeny with kernel   P C + β Q C , where   α , β are chosen at random from ᴢ/ l A e A z and ᴢ/ l C e C z , respectively. { E A ,   Φ A P C ,   Φ A Q C , E C ,   Φ C P A ,   Φ C Q A } be given, find j-invariant of E 0 / P A + α Q A ,   P C + β Q C )⟩.
Problem 4 (supersingular isogeny auxiliary point ccomputation ( S I A P C A )): suppose Φ A :   E 0 E A to be an isogeny with kernel ( P A + α Q A ) where α chose at random from ᴢ/ l A e A z and is not divisible by l A . The supersingular isogeny auxiliary point computation problem is to find the auxiliary point Φ A P C and Φ A Q C , where   { E , E A ,   P A , Q A , P C , Q C } are given.
Problem 5 (supersingular isogeny auxiliary point computation ( S I A P C C )): suppose Φ C :   E 0 E C to be an isogeny with kernel ( P C + β Q C ) where β is chosen at random from ᴢ/ l C e C z and is not divisible by l C . The supersingular isogeny auxiliary point computation problem is to find the auxiliary point Φ c P A and Φ C Q A , where { E , E A ,   P A , Q A , P C , Q C } are given.
A signature scheme consists of three polynomial time algorithms: key generation, registration, and validation. We prove the security of the scheme using the existential unforgeable under an adaptively chosen message attack (EU-ACMA) (32). A forger and a challenger play a game where the forger uses the public key and signing oracle model. The forger issues signature queries to the sign oracle to generate a signature σ i of message m i and the oracle sends σ i to the forger. The attack is considered successful when the forger produces a valid signature and message pair different from those generated from the query oracle.
Definition 1.
A digital signature scheme is existentially unforgeable under an adaptively chosen message attack (EU-ACMA) if any adversary à cannot produce a valid message–signature pair in polynomial time with access to the signing oracle.
Setup: Suppose we have a function KeyGen to output key pair (pk, sk), and challenger give the pk to the adversary Ã.
Queries: The adversary à issues signature queries to sign oracle Ś to generate valid signature σ 1 . , ,   σ i corresponding to messages M 1 , , M i .
Output: Finally, adversary à generates a valid message signature pair ( M * ,   σ * ) and wins the game if M *   M i .
The signature scheme is secure if probability to distinguish between simulated signature and real signature is negligible for adversary à with access to signing oracle S i g n s k . i.e.,
Pr   p k ,   s k k e y G e n 1 n M i , σ i à S i g n s k . pk   V e r i f y P K M , σ = 1   a n d   M *     M i   n e g l   λ

3.2. System Model

We consider an IoE environment in which several heterogeneous smart nodes such as an individual human, an organization, sensors, vehicles, smart watches, smart phones are deployed as shown in Figure 1. We classify these smart nodes into two main categories: service provider and client. In the IoE environment, a client can be an organization, an individual human or any device that wants to access services such as health reports collection, banking, e-commerce. The client encrypts the data with its signature and sends it to the service provider. The service provider allows authentic clients to access the service. A service provider provides an organization with three servers: the key generation server, the database server, and the validation server. For individual clients, the key generation server generates the global parameters and public–private keys. The database server maintains the data and the validation server helps in authenticating the clients. The service provider generates appropriate rights using a tag machine and performs key generation, encryption/decryption using the supersingular isogeny curves. It issues the rights to clients based on the service such as a client can view only his/her data for a particular period. The Internet of Everything (IoE) is considered as superset of Internet of Things (IoT). IoE covers the wider concept of connectivity where network intelligence at the edge devices makes it a more complex network tha then IoT. So, basically, it can be considered as an extension of the IoT in terms of network management and network intelligence.
Figure 1. A system model for the lightweight postquantum ID-based signature (LPQS) framework.
To ensure secure data transmission between a service provider and clients, and to reduce the complexity of the system with less consumption of the system resources, we present a LPQS scheme for secure data transmission for an IoE environment. The scheme uses supersingular isogeny curves for the postquantum cryptography signature. The proposed scheme consists of four phases: initialization, registration, signature, and validation. In the first phase, the service provider initializes all the parameters for global access. In the second phase, the service provider calculates the basis points for the clients using the ID of an individual client. The client performs the signature on the data with the help of the service provider in the signature phase. In the validation phase, the clients and service providers validate each other using the two isogeny curves. We want to clarify that “green” means a reduction in the computing requirement for providing security in the IoE environment. The proposed framework LPQS reduces the size of keys and signature for enabling security in the IoE. It also uses keys which can be used for longer period and are flexible in use, further reducing computation at the IoE nodes. Thus, green design means it is energy-efficient for the IoE nodes, as well as computing power efficient for the coordinator nodes at the edge.

3.3. Lightweight Post Quantum Signature

Firstly, in the initialization phase, the service provider initializes the system by setting all the global parameters as a set p ,   E ,   P A ,   Q A ,   I A 2 ,   I B 3 ,   n ,   m , where the description and use of every parameter is given in Table 1. Isogeny-based cryptosystem uses supersingular elliptic curves over characteristic p , where p is a prime of the form   2 n × 3 m × f   ± 1 . Here, n ,   m are positive integers such that 2 n   3 m and f is a small cofactor to ensure p as a prime. This special form of p allows us to efficiently compute isogenies, as given in the next sections. The global parameters generated by service provider include p ,   E ,   P A ,   Q A ,   I A 2 ,   I B 3 ,   n ,   m over the curve E of finite field F p 2 of characteristics p with p 2 element. The service provider selects a random integer α, such that 0     α   2 n . The random number α is kept secret as the service provider’s secret key. The service provider uses an ephemeral secret key, which changes in every session to support nontraceability. Fix points P A ,   Q A ϵ E 2 n such that group P A ,   Q A generated by P A and Q A in the whole group E 2 n . The elliptic curve points P A ,   Q A are the global parameters of the supersingular isogeny-based cryptosystem. G T A   = P A + α Q A , where G T A is the generator of a kernel of service provider which creates a secret subgroup of E[ 2 n ]. E A = E / G T A is the elliptic curve that is the image curve under the isogeny { Φ A }.
Table 1. Nomenclature.
Secondly, the in registration phase, service provider performs the registration with the help of the client (C) to provide access to the facility/services of the service provider in the IoE environment as shown in Figure 2 and the steps are:
Figure 2. Flow diagram of registration and signature.
Step 1.
The client sends its identity I D C generated randomly to the service provider through a public channel.
Step 2.
After receiving the I D C , the service provider calculates basis points of client i.e.,   Q C and P C using the I D C and r i g h t , which are assigned by service provider as expressed by Equations (1) and (2).
Q C = H I D C   | |   f
P C = H r i g h t   | |   I D C p
where, H is a fixed hash function, and rights are the authority assigned to the client. The notation is the xor function, and | | is a concatenation operation.
Step 3.
The service provider generates the public key of client as Φ A P C ,   Φ A Q C ,   P C ,   Q C ,   r i g h t and sends it to the c l i e n t .
Step 4.
Upon receiving Φ A P C ,   Φ A Q C ,   P C ,   Q C , r i g h t , the client selects a random number as a secret key from 0     β     3 m . The generator G C for the kernel of the client is expressed as given by Equation (3).
G C = P C + [ β ] Q C
where P C and Q C are the basis for E C and E C = E / G C .
Step 5.
The client computes the image curve E A C and also computes the shared secret value j E A C , where j E A C is the j-invariant of the image curve E A C .
Thirdly, in the signature phase, the client does the following four steps to sign message m which is shown in Figure 2.
Step 1.
The client calculates the s e s s i o n k e y   s k = H t C , j E A C , I D C ,   U ,   V , where U = Φ C P A ,   V = Φ C Q A and t C is the timestamp.
Step 2.
Further, encrypt the seed value r B as expressed by Equation (4).
C B = E n c I D C r B   s k ,   for   1     B     t
Step 3.
Compute s =   H m ,   C 1 , , C t . Parse s as t values C H B 0 , 1 C .
Step 4.
If C H i = 1 then response r e s p i = G C , Φ A G C else r e s p i = Φ c G A . Φ A G C is only calculated by the service provider and verification key v k B = h ( t C ,   j E A C ,   I D C ,   r B , C H B , s ) for 1 B t . The client sends the login request σ { C B ,   v k , t C , r e s p i , s } to the service provider.
In this last validation phase the service provider and the client validate each other, which is shown in Figure 3 with stepwise description as follows.
Figure 3. The work flow of client and service provider validation.
Step 1.
The service provider checks the validity of t C of received signature σ and if it is valid then proceeds further; otherwise the service provider rejects the request. After checking the t C validity, the service provider calculates the image of the client with the help of its basis as, Φ A P C = Φ C P A = U , Φ A Q C = Φ C Q A = V and also computes s k = H t C ,   j E C A , I D C , U , V and r B as expressed by Equation (5).
r B = D e c I D C C B s k
for i = 1 to t, parse s as t values and check if C H i = 1 , then parse r e s p i . Check if r e s p i has order 3 m and if G C generates E C and Φ A G C generates E C A . If C H i = 0 , then check if r e s p i has order 2 n and generates E A C and v k = h t C ,   j E C A , r B ,   I D C ,   C H B , s   . If v k is equal to v k then c l i e n t C is authenticated.
Step 2.
The service provider computes p a i r i n g v a l u e = e 2 n P A . v k ,   Q A 3 m and develops the key and authentication using s k and v k as expressed in Equations (6) and (7), and computes the value of Φ A s k ,   Φ A p k ,   E V and j A V (as shown in Figure 3) and send σ   p a i r i n g v a l u e ,   a u t h to the client.
K e y = H s k v k   j ( E A V ) ,
a u t h = H t C ,   s k ,   v k ,   j A V
Step 3.
After receiving the signature, the client verifies the authenticity of the service provider and computes K e y =   H s k v k   j ( E A V ) and G V = s k + β v k and j V C as shown in Figure 3. Further, it calculates X = Φ C P A . v k ,   Y = Φ C Q A , a u t h = H t C ,   s k ,   v k ,   j V C and also verifies the pairing e 2 n X , Y . Now the service provider is also verified.

4. Security Analysis and Experimental Results

4.1. Mathematical Security Analysis

Theorem 1.
The digital signature LPQS is EU-ACMA in the quantum random oracle model with constraint relation expressed in Equation (8).
ε   ( 1 / 2 n )   1 q q / 2 k 4 q h q s 1 q q / 2 F P 2 P r C
where
1 / 2 n < 1 4 , q q / 2 F P 2 < 1 3 ,   so   ε 2 1 q q / 2 k 4 q h q s P r C .
Proof. 
Suppose an adversary A exists in the system who can produce valid LPQS signatures. It takes system parameters {   p ,   E ,   P A ,   Q A , I A 2 ,   I B 3 ,   n ,   m ,   P c ,   Q c }, public keys ( E A , Φ A P C ,   Φ A Q C ) and a verifier ( E B , Φ C P A ,   Φ C Q A ) . The adversary make queries q to the oracle of client C with queries of a signing oracle (Ȿ), and a verifying oracle (ν), and a hashing oracle (). The adversary A aims at producing σ { C B ,   v k , t C , r e s p i , s } for M *   M i . To generate a regular LPQS signature, he first calculates the basis point U, V. Then he computes s k and encrypts the seed value. Let C H 0 ,   C H 1 represent the possible outcome of the challenge c h = 0 , 1 , respectively, with the cardinality of c . If c h = 0 , then r e s p = Φ c G A otherwise r e s p = G C , Φ A G C . The verifier will accept the signature if the r e s p contains the right order. □
We now calculate the success probability of adversary A. The probability of the secret value of the signing oracle 0   α 2 n is guessed successfully is 1/ 2 n . The probability adversary A can produce a valid signature by inquiring q q queries to the signing oracle are 1 q q / 2 k 4 q h q s where q h , q s denotes the total number of queries for a hashing and signing oracle and k is the output length of the hash function h . The 4 q h queries are required to calculate s k , v k , k e y , and a u t h . Another probability that A solves the SSCDH problem is at least 1 q q / 2 F P 2 . Therefore, the successful simulation of A happens with a probability constraint relation as expressed in Equation (8). This contradicts with the hardness of the SIDH problem (Poblem 3). Thus, there is no adversary A that could forge a signature under an adaptively chosen message attack.

4.2. Theoretical Security Analysis

In this subsection, we present theoretical analysis of the LPQS scheme to prove its resistance against various cyberattacks and it is described as:
(1)
Mutual authentication: the client and the service provider share the messages   { C B ,   v k , t C } and   p a i r i n g v a l u e ,   a u t h   , respectively. v k depends on the j E A C which is a SIDH problem (Problem 3) and it is hard to find the value of j E A C . Furthermore, C B is also difficult for the adversary to obtain as it contains s k . Similarly, a u t h cannot be calculated because of the hardness of SIDH. Therefore, our scheme provides mutual authentication.
(2)
Anonymity: in the proposed scheme, the client’s identity is hidden in the message { C B ,   v k , t C } , where v k = h ( t C ,   j E A C ,   I D C ,   r B ) , C B = E n c I D C r B   s k , s k = H t C , j E A C , I D C ,   U ,   V . To find the value of the client’s identity, the adversary has to calculate the j E A C which is a SIDH problem (Problem 3). Therefore, our scheme is secure to maintain the anonymity of the client.
(3)
Nontraceability: suppose the adversary stores the value of { C B ,   v k , t C } and the   p a i r i n g v a l u e ,   a u t h   exchange between client and service provider. As α and β are the ephemeral keys and changing in each session separately, even if the adversary guesses the private key it will not be possible to find the auxiliary point { Φ c P A , Φ C Q A ,   Φ A P C , Φ A Q C } as given in Problem (4),(5).
(4)
No verification table: in the proposed scheme, no verification table has been maintained for the mutual authentication between the client and the service provider.
(5)
Session key agreement: the client and the service provider both generate the session key, k e y = h   s k ,   v k ,   j ( E A C ) , where s k = H t C , j E A C , I D C ,   U ,   V , v k = h ( t C ,   j E A C ,   I D C ,   r B ) ,   U = Φ A P C , V = Φ A Q C . For an adversary it is not possible to create a valid login session because of the Problem (4) and (5). So, our scheme could provide the session key agreement.
(6)
Perfect forward secrecy: perfect forward secrecy is provided by j ( E A C ) and is explained in Theorem 1.
(7)
Attack resistance: we present that our scheme is resistant to impersonation attacks, replay attacks, modification attacks, stolen verifier attacks and the man-in-the-middle attacks.
(a)
Impersonation attack: according to Theorem 1, we can claim that any adversary without any secret key cannot generate a generator as described in problem (1), (2) and without the generator no auxiliary point can be calculated as described in problem (4) and (5). So, only a valid client and service provider can create a login message or response { C B ,   v k , t C } ,     p a i r i n g v a l u e ,   a u t h . Then the client and the service provider can check the validity of each other by checking the   p a i r i n g v a l u e ,   a u t h , and { C B ,   v k , t C } and can find out if any adversary is present in the system.
(b)
Replay attack: in the LPQS scheme, the client access the service by generating the message   { C B ,   v k , t C } . After receiving the message, the service provider checks the freshness of t C , before executing the other steps. If in any case adversary generates t C and captures the packet { C B ,   v k , t C } , the adversary would not be able to calculate the key without knowing the private key of the client i.e., β. Furthermore, an adversary cannot use the same login message in another session as clients and service providers use a different key {α, β} in each session. So, the client and service provider could find the replay attack by checking the { p a i r i n g v a l u e , a u t h } and { C B ,   v k , t C } .
(c)
Modification attack: the service provider can detect the modification attack by checking the validity of the signature { C B ,   v k , t C } . Similarly, the clients can check the validity of p a i r i n g v a l u e s , a u t h .
(d)
Stolen verifier table attack: no table is maintained in our scheme by the client or the service provider. So, no such attack is possible.
(e)
Man-in-middle attack: due to the mutual authentication, no man-in–the middle attack is possible.
(8)
Due to the usage of supersingular isogeny curves, we can effectively compress the keys and signature size. The infinite field F p 2 elements used to transmit the points Φ A P C ,   Φ A Q C are rather large compared to the size of the integer coefficients. However, we have used compressed curves which can be represented by one field element. The key basis calculated by the nodes need not be published as a public parameter, as long as all nodes are able to generate the same basis independently by a predefined algorithm. It also supports perfect forward-secrecy, nontraceability and anonymity as detailed in Section 4.2. In summary, to efficiently exploit the resistant capability of postquantum cryptography, we have used a supersingular isogeny curve and an ID-based signature for postquantum cryptography that requires much shorter keys to maintain the same level of protection and provides user friendly access to the security system.

4.3. Computation Cost Analysis

The computation cost of the LPQS scheme is given in detail for the public key, the private key and the signature. In this computation, we have neglected the lightweight operations like XOR and string concatenation, as we know primes p have the form of   2 n .3 m . f   ± 1 , such that 2 n   3 m . We compute the cost in terms of λ bits for the λ bits of a quantum computer. We assume p has 6λ bits length. All values are calculated for 128-bit security. Our scheme uses Montgomery curves E : B y 2 = x 3 + A x 2 + x , where A–coefficient is sufficient for isogeny computation. The isomorphism classes of the Montgomery form have the same Kummer line. So, both can be represented by one field element, requiring 12 λ-bits. We compare LPQS in the terms of the sizes of public and private keys, and signatures with variants of lattice, multivariate and isogeny, and is shown in Table 2.
Table 2. Postquantum signatures scheme comparison in bytes with 128-bit quantum security.
(1)
Public Keys
In LPQS, public keys contain Φ A P C ,   Φ A Q C ,   P C ,   Q C ,   r i g h t , where P C   a n d   Q C ,   are the points on the elliptic curve E of order 3 m calculated by the service provider using XOR and concatenation operations. So, its cost is negligible and r i g h t needs no operation. Further, torsion basis ( Φ A P C ,   Φ A Q C ) requires three 3 λ-bits coefficients and 12 λ-bits for the curve. Thus, the public key requires 21 λ-bits. For 128-bit quantum, it needs 336 bytes (21 × 128 = 2688 bits). Other postquantum techniques such as lattice-based (6) and multivariate (28) need 11,653 bytes and 417,408 bytes, respectively.
(2)
Private keys
Private keys contain the two generators G T A ,   ,   G A v ,   as described in the Section 4. The private key G T A G T A = P A + α Q A can be represented as a single coefficient α with respect to the basis point P A ,   Q A and it requires 3 λ-bits. So, for two generators we need 6 λ-bits and for 128-bit security level we need 96 bytes (6 × 128=768 bits).
(3)
Signature
The signature of the client includes { C B ,   v k , t C } , where C B is an encrypted representation of the random seed value r B and ( s k = H t C , j E A C , I D C ,   U ,   V ). As we discussed in the previous section, the computation cost of U ,   V is 6 λ-bits and the hash function is 3 λ-bits. The J-invariant ( j E A C ) requires 6 λ-bits to store the value in the 128-bit computer. Further, v k   v k = h ( t C ,   j E A C ,   I D C ,   r B ) takes 3 λ-bits for the hash function. So, the total cost will be 18 λ-bits. The service provider’s signature includes the   p a i r i n g v a l u e ,   a u t h , where the mapping cost is negligible and auth =   H k e y t C ,   s k ,   v k ,   j A V . The hash function requires 3λ-bits and similarly the s k ,   v k need 15 and 3λ-bits, respectively, and Key = H s k v k   j ( E A V ) requires 3 λ-bits. Thus, the total signature cost of the client and service provider is 39 λ-bits. Thus, on average, our scheme requires 21λ-bits (336 bytes) for a public key, 6 λ-bits (96 bytes) for private key and 39 λ 2 -bits (39 × 128 × 128 = 79,872 bits) which is equal to 9984 bytes for a signature to achieve 128-bit of quantum security. Comparatively, the signature size is larger than the public and private key because for the signature we use two torsion groups ( E A ,   E C ) to increase the hardness of the isogeny problem, but it requires more storage space.

4.4. Experimental Implementation and Discussion

In this section, we evaluate the performance of the ID-based LPQS scheme for secure data transmission in the IoE environment. The C implementation done in (36) is further extended to include the signature scheme introduced in this paper. For the comparison analysis, we compute the energy consumption, computation time, and CPU cycles taken by the key generation, signing, and verification. We use the C language in the Microsoft Visual Studio 2013 platform on Intel(R) Core(TM) i7-8700 CPU @3.20 GHZ with ×64-based processor, running Windows 10 to implement the proposed scheme. Intel Power Gadget 3.7.0 is used to measure the execution time and energy consumption of LPQS. We also used Raspberry Pi-based IoE nodes to measure the performance of the embedded devices. Our scheme uses Montgomery curves E : B y 2 = x 3 + A x 2 + x , where the A–coefficient is sufficient for isogeny computation. The comparative analysis is performed with state-of-the-art nonquantum and postquantum techniques.

4.4.1. Nonquantum Schemes

In this subsection, we compare the energy and time of LPQS with predicate nonquantum signature schemes ASMS (20) and TinyTate (21) for 128-bit nonquantum security level. Nonquantum security 128-bit is approximately equal to 85-bit security level. ASMS and TinyTate use the elliptic curve y 2 = x 3 + x . We have considered one ID and one byte of data transmission using AES-128. In terms of energy, ASMS and TinyTate take 110 mJ and 440 mJ, respectively, to perform key generation, signature and verification, while LPQS needs 196.85 mJ to perform the same task, which is 123% more efficient than TinyTate. The total time consumption of LPQS is 8.057 ms. ASMS and TinyTate take 2410 ms and 600 ms, respectively, as is shown in Figure 4. So, LPQS is approximately 300 and 74 times faster than ASMS and TinyTate, respectively. The reason for less computation time is the use of the isogeny curve. It takes less time to perform addition, subtraction and multiplication and hence the overall time reduces effectively. It is noted that 128-bit nonquantum security can be achieved at 85-bit quantum security level with a reasonable tradeoff between energy and time.
Figure 4. Computation cost of nonqunatum techniques for energy and time consumption.

4.4.2. Postquantum Schemes

In this section, we evaluate the performance of the LPQS scheme with state-of-the-art schemes. The performance of the LPQS scheme is evaluated in terms of time for key generation, signature and verification, which are iterated 10 times for prime p 503 , p 751 , p 1019 , and p 1533 . A comparative analysis of the energy with nonisogeny signature schemes SPHINCS (9) and Rainbow (30) are presented. The total number of clock cycles is also analysed and compared with the isogeny based schemes Efficient Algorithms for Supersingular Isogeny (EASI) (16), Microsoft’s Supersingular Isogeny Diffie-Hellman (MSIDH) (36), Efficient Post-Quantum Undeniable signature (EPQU) (39), and Key Compression for Isogeny-Based cryptosystems (KCIB) (40). In LPQS, we use supersingular elliptic curves with prime p =   2 n .3 m . f   ± 1 . For prime p 503 , n is 250, m is 159, f is 1 and it provides 83 bit quantum security, which is approximately equal to 85-bit quantum security, and other prime values are shown in Table 3.
Table 3. Public parameters with comparative nonquantum and quantum security (bits).
The computation time of key generation for different p values is shown in Figure 5a and Table 4. All results are run for 10 iterations. For p 503 , p 751 , p 1019 , and p 1533 the key generations’ average running times are 1.25, 2.96, 6.45 and 11.17 ms, respectively. Further, the average running times of signature generation for p 503 , p 751 , p 1019 , and p 1533 are 1.75, 3.9, 9.20 and 16.44 ms, respectively. Signature time is more than key generation time because we use two isogeny curves (i.e., Φ A , Φ C ) and only one isogeny is used for key generation (i.e., Φ A ). In Figure 5c, the computation time of verification is shown and it is clear that average running times for p 503 , p 751 , p 1019 and p 1533 are 3.45, 8.17, 18.84 and 33.66 ms, respectively. Verification needs three times more computation time than key generation and two times more computation time than the signature phase. Thus, most of the computation time is spent on verification because the signature size is larger than the public and private keys and in addition, two isogeny operations and one pairing operation are also performed.
Figure 5. Various computation time of different phase vs. number of iterations with different p values.
Table 4. Computation time of different phases for different prime values.
In Figure 6, the energy consumption of the LPQS is shown for different message sizes. The message size’s impact on the energy consumption and is clear from Figure 6 and Table 5. For a 5 byte message, the maximum and minimum energy consumptions are 848.440 mJ and 8243.409 mJ, respectively. Energy consumption is increasing exponentially with the increase of the message size and security level. Hence, for a security level of 256-bits and a message size of 20 bytes, the energy consumption is 34,733.251 mJ. The total times taken to complete the processes for p 1019 are 43.82, 49.64, 93.00, 103.00 and 131.21 ms for 1, 2, 5, 10 and 20 bytes of message, respectively. It is clear from Figure 7 and Table 6 that the total time is increasing linearly with increase in the size of the messages.
Figure 6. Comparison for energy (in millijoules) with message sizes (in bytes) for various p sizes.
Table 5. Message size vs. energy consumption (mJ) for different p values.
Figure 7. Total time to perform the operations considering different message sizes (in bytes) for various p sizes.
Table 6. Message size vs. time (ms) for different p values.
We have compared the energy consumption and time computation of LPQS with the nonisogeny signature scheme for 128-bit, 192-bit and 256-bit security levels. In this comparison, we are considering message size as one byte for one ID. For 128-bit security level, Rainbow and SPHINCS need energy of 234.76 mJ and 3706.66 mJ, respectively. LPQS consumes 196.854 mJ, which is approximately 1.1 times and 19 times more efficient than Rainbow and SPHINCS, respectively, and is shown in Figure 8a and Table 7. For 256-bit security level, LPQS needs 1070.64 mJ while Rainbow and SPHINCS take 8518.95 mJ and 15,394.60 mJ, respectively. Further time taken by Rainbow and SPHINCS for 128-bit security are 9.12 ms and 125.9 ms, respectively. For the same security level LPQS needs 8.057 ms, which is approximately 15 times faster than SPHINCS.
Figure 8. (a) Energy consumption, (b) computation time comparison of LPQS with nonisogeny based methods.
Table 7. Comparison of total energy (mJ) with postquantum techniques at different security level.
For 256-bit security level, Rainbow and SPHINCS take 340.86 ms and 548.30 ms. However, LPQS needs 43.821 ms for 256-bit security level, as is shown in Figure 8b. These values may be different for different processors. However, LPQS has smaller public and private key sizes (as shown in Table 2), and it consumes less energy and time, and is clear from Figure 8. As shown in Figure 9, EASI takes 754.102 mJ of energy and 7580 million CPU cycles for SIDH key exchange, while EPQU needs energy of 1637.039 mJ and 16,455 million cycles for an undeniable signature. MSIDH and EASI consume 7836 and 3009 million cycles, respectively, for the complete process, while LPQS takes 1976 million cycles and needs 196.854 mJ of energy for the signature, which is the least among the state-of-the-art schemes. The reason for the lower amount of energy and fewer CPU cycles is the usage of two isogeny curves instead of one, which takes the previously computed values for the second verification.
Figure 9. (a) Energy consumption; (b) clock cycle comparison with isogeny based postquantum schemes.
The energy consumption of the embedded devices implemented in Raspberry Pi for different numbers of nodes is shown in Figure 10a. In this environment, the numbers of clients are increasing from 2 to 10. For two clients the energy consumption is 233.109 mJ and for six clients 497.805 mJ for p503. Further, the energy consumption for p1019 with eight clients is 2612.706 mJ. As we know, the keys are computed once and used for a long period of time. For the signature, the clients need only one pairing and hash operation, which takes less energy for computation. Figure 10b shows the number of clock cycles consumed for a number of nodes ranging from 2 to 10. For p751, the number of clock cycles taken are 1391 and 1640 million cycles for 8 and 10 nodes, respectively. The LPQS consumes fewer CPU cycles because it uses previously computed isogeny values for the next computation.
Figure 10. (a)Energy consumption, (b) number of clock cycles in million cycles with number of nodes.

5. Conclusions and Future Work

In this paper, we presented a lightweight postquantum ID-based signature scheme using the supersingular elliptic curve isogeny for the IoE environments. We use the ID for the calculation of the basis for clients and two isogenies for the verification of service provider and clients. Compressed curves are used to reduce the size of keys and validation of signature depends on the commutative property of curves. In comparison with the nonquantum schemes, LPQS outperforms state-of-the-art techniques in terms of time, CPU cycle and energy. Further, Montgomery curves reduced the public and private keys, and signature sizes. We performed a thorough analysis of postquantum schemes on X86-64 system and Raspberry Pi enabled embedded nodes. The results have clearly shown that the LPQS is feasible for embedded devices. Finally, in comparison with the state-of-the-art techniques, the LPQS scheme is more efficient and secure. In the future, we will extend our scheme to investigate how to represent the elliptic curves efficiently and use the three-party id-based signature scheme based on the supersingular isogeny curve for future networks such data or content focused networking [44] and vehicular communication [45].

Author Contributions

Conceptualization, R.R.; formal analysis, R.R.; investigation, R.R.; methodology, R.R.; supervision, S.K., O.K.; validation, A.M.K., J.L.; writing, R.R.; review and editing, O.K., M.A.A.-K., M.M., A.A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University. Jeddah. under grant No. (DF-457-156-1441).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The experimental data and associated settings will be made available to researchers and practitioners on individual request to corresponding author, with the restrictions that it will solely be used for further research in literature progress. As the associated research data is being further utilized for development research by the team.

Acknowledgments

This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University. Jeddah. under grant No. (DF-457-156-1441). The authors, therefore, gratefully acknowledge DSR for technical and financial support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Farhan, L.; Kharel, R.; Kaiwartya, O.; Quiroz-Castellanos, M.; Alissa, A.; Abdulsalam, M. A concise review on Internet of Things (IoT)-problems, challenges and opportunities. In Proceedings of the 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Budapest, Hungary, 18–20 July 2018; pp. 1–6. [Google Scholar]
  2. Rahman, A.-U.; Afsana, F.; Mahmud, M.; Kaiser, M.S.; Ahmed, M.R.; Kaiwartya, O.; James-Taylor, A. Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things. IEEE Internet Things J. 2019, 6, 4049–4062. [Google Scholar] [CrossRef]
  3. Kumar, S.; Singh, K.; Kumar, S.; Kaiwartya, O.; Cao, Y.; Zhou, H. Delimitated anti jammer scheme for Internet of vehicle: Machine learning based security approach. IEEE Access 2019, 7, 113311–113323. [Google Scholar] [CrossRef]
  4. Verma, G.K.; Singh, B.B.; Kumar, N.; Kaiwartya, O.; Obaidat, M.S. PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System. IEEE Syst. J. 2019, 14, 1704–1715. [Google Scholar] [CrossRef]
  5. Monz, T.; Nigg, D.; Martinez, E.A.; Brandl, M.F.; Schindler, P.; Rines, R.; Wang, S.X.; Chuang, I.L.; Blatt, R. Realization of a scalable Shor algorithm. Science 2016, 351, 1068–1070. [Google Scholar] [CrossRef]
  6. Alkim, E.; Bindel, N.; Buchmann, J.; Dagdelen, Ö.; Eaton, E.; Gutoski, G.; Krämer, J.; Pawlega, F. Revisiting TESLA in the Quantum Random Oracle Model. In Constructive Side-Channel Analysis and Secure Design; Springer: Berlin/Heidelberg, Germany, 2017; pp. 143–162. [Google Scholar]
  7. Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 238–268. [Google Scholar] [CrossRef]
  8. Stehlé, D.; Steinfeld, R. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices. In Proceedings of the Constructive Side-Channel Analysis and Secure Design; Springer: Berlin/Heidelberg, Germany, 2011; pp. 27–47. [Google Scholar]
  9. Bernstein, D.J.; Hopwood, D.; Hülsing, A.; Lange, T.; Niederhagen, R.; Papachristodoulou, L.; Schneider, M.; Schwabe, P.; Wilcox-O’Hearn, Z. SPHINCS: Practical stateless hash-based signatures. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 368–397. [Google Scholar]
  10. Hamza, M.; Guenda, K. A New variant of the McEliece cryptosystem based on the Smith form of convolutional codes. Cryptologia 2018, 42, 227–239. [Google Scholar]
  11. Yoo, Y.; Azarderakhsh, R.; Jalali, A.; Jao, D.; Soukharev, V. A post-quantum digital signature scheme based on supersingular isogenies. In Proceedings of the International Conference on Financial Cryptography and Data Security, Sliema, Malta, 3–7 April 2017; Springer: Cham, Switzerland, 2017; pp. 163–181. [Google Scholar]
  12. Couveignes, J.M. Hard Homogeneous Spaces. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.5396&rep=rep1&type=pdf (accessed on 25 December 2020).
  13. Rostovtsev, A.; Stolbunov, A. Public-key cryptosystem based on isogenies. IACR Cryptol. ePrint Arch. 2006, 145. [Google Scholar]
  14. De Feo, L.; Jao, D.; Plût, J. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In Proceedings of the International Workshop on Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 19–34. [Google Scholar] [CrossRef]
  15. De Feo, L.; Jao, D.; Plût, J. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 2014, 8, 209–247. [Google Scholar] [CrossRef]
  16. Costello, C.; Longa, P.; Naehrig, M. Efficient Algorithms for Supersingular Isogeny Diffie-Hellman. In Proceedings of the Advances in Cryptology | CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 572–601. [Google Scholar]
  17. Galbraith, S.D.; Petit, C.; Silva, J. Identification protocols and signature schemes based on supersingular isogeny problems. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2017; pp. 3–33. [Google Scholar]
  18. Adi, S. Identity-based cryptosystems and signature schemes. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1984. [Google Scholar]
  19. Vélu, J. Isogénies entre courbes elliptiques. In Comptes Rendus de l’Académie des Sciences de, C.R. Acad. Sci.; Elsevier of behalf of the French Academy of Sciences (France): Paris, France, 1971; Volume 273, pp. 238–241. [Google Scholar]
  20. Malasri, K.; Wang, L. Addressing Security in Medical Sensor Networks. In Proceedings of the ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet’07); Association for Computing Machinery: New York, NY, USA, 2007; pp. 7–12. [Google Scholar]
  21. Oliveira, L.B.; Aranha, D.; Morais, E.; Daguano, F.; Lopez, J.; Dahab, R. TinyTate. In Proceeding of the Identity-Based Encryption for Sensor Networks, White Plains, NY, USA, 19–23 March 2007. [Google Scholar]
  22. Tan, C.C.; Wang, H.; Zhong, S.; Li, Q. Body Sensor Network Security: An Identity-Based cryptography Approach. In Proceedings of the ACM Conference on Wireless Security, Alexandria, VA, USA, 31 March–2 April 2008; pp. 148–153. [Google Scholar]
  23. Sankaran, S.; Husain, M.I.; Sridhar, R. IDKEYMAN: An identity-based key management scheme for wireless ad hoc body area networks. In Proceedings of the 5th Annual Symposium on Information Assurance (ASIA’09), Buffalo, NY, USA, 3–4 June 2009. [Google Scholar]
  24. Miao, F.; Jiang, L.; Li, Y.; Zhang, Y. AES based biometrics security solution for body area sensor networks. Bull. Adv. Technol. Res. 2009, 3, 37–41. [Google Scholar]
  25. Ma, C.; Xue, K.; Hong, P. Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 2014, 7, 759–773. [Google Scholar] [CrossRef]
  26. Sun, X.; Tian, H.; Wang, Y. Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies. 2012 Fourth Int. Conf. Intelligent Netw. Collab. Syst. 2012, 5, 292–296. [Google Scholar] [CrossRef]
  27. Fouque, P.-A.; Hoffstein, J.; Kirchner, P.; Lyubashevsky, V.; Pornin, T.; Prest, T.; Ricosset, T.; Seiler, G.; Whyte, W.; Zhang, Z. Falcon: Fast-Fourier Lattice-Based Compact Signatures over NTRU. Available online: https://www.di.ens.fr/~prest/Publications/falcon.pdf (accessed on 10 December 2020).
  28. Casanova, A.; Faugere, J.C.; Macario-Rat, G.; Patarin, J.; Perret, L.; Ryckeghem, J. GeMSS: A Great Multivariate Short Signature. Ph.D. Thesis, UPMC-Paris 6. Sorbonne Universités, Paris, France, 2017. [Google Scholar]
  29. Petzoldt, A.; Chen, M.S.; Ding, J.; Yang, B.Y. HMFEv-an efficient multivariate signature scheme. In Proceedings of the International Workshop on Post-Quantum Cryptography, Utrecht, The Netherlands, 26–28 June 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 205–223. [Google Scholar]
  30. Ding, J.; Petzoldt, A. Current State of Multivariate Cryptography. IEEE Secur. Priv. Mag. 2017, 15, 28–36. [Google Scholar] [CrossRef]
  31. Childs, A.; Jao, D.; Soukharev, V. Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 2014, 8, 1–29. [Google Scholar] [CrossRef]
  32. Shim, K.A.; Park, C.M.; Koo, N.; Seo, H. A High-Speed Public-Key Signature Scheme for 8-b IoT-Constrained Devices. IEEE Internet Things J. 2020, 7, 3663–3677. [Google Scholar] [CrossRef]
  33. De Feo, L.; Galbraith, S.D. SeaSign: Compact isogeny signatures from class group actions. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19–23 May 2019; Springer: Cham, Switzerland, 2019; pp. 759–789. [Google Scholar]
  34. Parrilla, L.; Castillo, E.; López-Ramos, J.A.; Álvarez-Bermejo, J.A.; García, A.; Morales, D.P. Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks. Sensors 2018, 18, 251. [Google Scholar] [CrossRef] [PubMed]
  35. Hussein, M.S.; Ramos, J.A.L.; Álvarez-Bermejo, J.A. Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro. Sensors 2020, 20, 2242. [Google Scholar] [CrossRef]
  36. Microsoft Research. Available online: https://www.microsoft.com/en-us/research/project/sidh-library/ (accessed on 15 December 2020).
  37. Li, F.; Zheng, Z.; Jin, C. Secure and efficient data transmission in the Internet of Things. Telecommun. Syst. 2015, 62, 111–122. [Google Scholar] [CrossRef]
  38. Lee, W.; Kim, Y.S.; No, J.S. A New Signature Scheme Based on Punctured Reed--Muller Code with Random Insertion. arXiv 2017, arXiv:1711.00159. [Google Scholar]
  39. Jalali, A.; Azarderakhsh, R.; Mozaffari-Kermani, M. Efficient post-quantum undeniable signature on 64-bit ARM. In Proceedings of the International Conference on Selected Areas in Cryptography, Ottawa, ON, Canada, 16–18 August 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 281–298. [Google Scholar]
  40. Azarderakhsh, R.; Jao, D.; Kalach, K.; Koziel, B.; Leonardi, C. Key compression for isogeny-based cryptosystems. In Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Xi’an, China, 30 May–3 June 2016; pp. 1–10. [Google Scholar]
  41. Banerjee, U.; Pathak, A.; Chandrakasan, A.P. 2.3 An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things. In Proceedings of the 2019 IEEE International Solid- State Circuits Conference—(ISSCC), San Francisco, CA, USA, 17–21 February 2019; pp. 46–48. [Google Scholar] [CrossRef]
  42. Ebrahimi, S.; Bayat-Sarmadi, S.; Mosanaei-Boorani, H. Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT. IEEE Internet Things J. 2019, 6, 5500–5507. [Google Scholar] [CrossRef]
  43. John, T. Endomorphisms of abelian varieties over finite fields. Invent. Math. 1966, 2, 134–144. [Google Scholar]
  44. Prasad, M.; Liu, Y.-T.; Li, D.-L.; Lin, C.-T.; Shah, R.R.; Kaiwartya, O.P. A New Mechanism for Data Visualization with Tsk-Type Preprocessed Collaborative Fuzzy Rule Based System. J. Artif. Intell. Soft Comput. Res. 2016, 7, 33–46. [Google Scholar] [CrossRef]
  45. Kaiwartya, O.; Kumar, S. Geocasting in vehicular adhoc networks using particle swarm optimization. In Proceedings of the International Conference on Information Systems and Design of Communication, Lisbon, Portugal, 16 May 2014; pp. 62–66. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.