Skip to main content
Top
Published in: Journal of Medical Systems 5/2020

01-05-2020 | Systems-Level Quality Improvement

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

Authors: Zhiyan Xu, Debiao He, Pandi Vijayakumar, Kim-Kwang Raymond Choo, Li Li

Published in: Journal of Medical Systems | Issue 5/2020

Login to get access

Abstract

An electronic health (e-health) system, such as a medical cyber-physical system, offers a number of benefits (e.g. inform medical diagnosis). There are, however, a number of considerations in the implementation of the medical cyber-physical system, such as the integrity of medical / healthcare data (e.g. manipulated data can result in misdiagnosis). A number of digital signature schemes have been proposed in recent years to mitigate some of these challenges. However, the security of existing signatures is mostly based on conventional difficult mathematical problems, which are known to be insecure against quantum attacks. In this paper, we propose a certificateless signature scheme, based on NTRU lattice. The latter is based on the difficulty of small integer solutions on the NTRU lattice, and is known to be quantum attack resilience. Security analysis and performance evaluations demonstrate that our proposed scheme achieves significantly reduced communication and computation costs in comparison to two other competing quantum resilience schemes, while being quantum attack resilience.
Literature
1.
go back to reference Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE
2.
go back to reference Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999CrossRef Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999CrossRef
3.
go back to reference Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics
4.
go back to reference Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365 Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365
5.
go back to reference Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018CrossRef Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018CrossRef
6.
go back to reference Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019CrossRef Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019CrossRef
7.
go back to reference Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015CrossRef Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015CrossRef
8.
go back to reference Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016 Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016
9.
go back to reference Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018CrossRef Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018CrossRef
10.
go back to reference Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61 Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61
11.
go back to reference Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer
12.
go back to reference Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018CrossRef Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018CrossRef
13.
go back to reference Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM
14.
go back to reference Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer
15.
go back to reference Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer
16.
go back to reference Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer
17.
go back to reference Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer
18.
go back to reference Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer
19.
go back to reference Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer
20.
go back to reference Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM
21.
go back to reference Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer
22.
go back to reference Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer
23.
go back to reference Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer
24.
go back to reference Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer
25.
go back to reference Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer
26.
go back to reference Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer
27.
go back to reference Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer
28.
go back to reference Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011 Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011
29.
go back to reference Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014CrossRef Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014CrossRef
Metadata
Title
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems
Authors
Zhiyan Xu
Debiao He
Pandi Vijayakumar
Kim-Kwang Raymond Choo
Li Li
Publication date
01-05-2020
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2020
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-020-1527-7

Other articles of this Issue 5/2020

Journal of Medical Systems 5/2020 Go to the issue