An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things  

在线阅读下载全文

作  者:Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 

机构地区:[1]School of Mechanical Engineering,Northwestern Polytechnical University,Xi’an,China [2]Department of Process and Information Technology,Chengdu Aircraft Industrial(Group)Co.,Ltd.,Chengdu,China [3]School of Information and Software Engineering,The Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China,Chengdu,China

出  处:《Computer Modeling in Engineering & Sciences》2024年第1期903-915,共13页工程与科学中的计算机建模(英文)

基  金:This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131);the YIBIN Science and Technology Support Plan(No.2021CG003);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).

摘  要:With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.

关 键 词:KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象