Abstract

In Industrial Internet of Things (IIoT), the certificate-based aggregate signature (CBAS) scheme was used to ensure privacy and security of IIoT, thus, the concrete construction of CBAS scheme without bilinear pairing has proposed, which was employed as an underlying building block to create an efficient data aggregation protocol. In this article, we first point out that the previous CBAS scheme cannot keep its claimed security. Particularly, a malicious KGC can compute a valid forgery signature, because it has the knowledge of the master secret key. After that, we discussed how specific forgery attacks could be made to against the existing CBAS schemes, which demonstrates that the previous related constructions cannot achieve its claimed security. In order to further provide a secure CBAS scheme for IIoT, we suggest a method to improve the CBAS scheme and propose a concrete construction of it. In the random oracle model, based on the hardness of discrete logarithm problem, the security of our new proposal can be proved. Compared with the previous CBAS schemes, our construction has better security, which is efficient with respect to computation and communication.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call