Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3197507.3197512acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

You Shall Not Pass! (Once Again): An IoT Application of Post-quantum Stateful Signature Schemes

Published: 23 May 2018 Publication History

Abstract

This paper presents an authentication protocol specifically tailored for IoT devices that inherently limits the number of times that an entity can authenticate itself with a given key pair. The protocol we propose is based on a stateful hash-based digital signature system called eXtended Merkle Signature Scheme (XMSS), which has increased its popularity of late due to its resistance to quantum-computer-aided attacks. We propose a 1-pass authentication protocol that can be customized according to the server capabilities to keep track of the key pair state. In addition, we present results when ported to ARM Cortex-M3 and M0 processors.

References

[1]
Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen . 2008. Post Quantum Cryptography (bibinfoedition1st ed.). Springer Publishing Company, Incorporated.
[2]
Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O'Hearn . 2015. SPHINCS: Practical Stateless Hash-Based Signatures Advances in Cryptology - EUROCRYPT 2015 (LNCS), Vol. Vol. 9056. Springer, 368--397.
[3]
Johannes A. Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, and Markus Rückert . 2011 b. On the Security of the Winternitz One-Time Signature Scheme Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa (LNCS), Vol. Vol. 6737. 363--378.
[4]
Johannes A. Buchmann, Erik Dahmen, and Andreas Hülsing . 2011 a. XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions. In Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011 (LNCS), Vol. Vol. 7071. 117--129.
[5]
Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, and Daniel Smith-Tone . 2016. Report on Post-Quantum Cryptography. (2016).
[6]
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, and Camille Vuillaume . 2008. Digital Signatures Out of Second-Preimage Resistant Hash Functions Post-Quantum Cryptography, 2nd International Workshop, PQCrypto 2008 (LNCS), Vol. Vol. 5299. 109--123.
[7]
M. H. Devoret and R. J. Schoelkopf . 2013. Superconducting Circuits for Quantum Information: An Outlook. Science Vol. 339, 6124 (2013), 1169--1174.
[8]
Gartner . 2014. Gartner says the Internet of Things will transform the data center. (2014). deftempurl%http://www. gartner.com/newsroom/id/2684616 tempurl
[9]
A. Hülsing, D. Butin, S. Gazdag, Rijneveld J., and Mohaisen A. . 2018. XMSS: Extended Hash-Based Signatures. (2018). deftempurl%https://www.ietf.org/id/draft-irtf-cfrg-xmss-hash-based-signatures-12.pdf tempurl
[10]
Andreas Hülsing, Lea Rausch, and Johannes A. Buchmann . 2013. Optimal Parameters for XMSS MT. In Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD (LNCS), Vol. Vol. 8128. 194--208.
[11]
Andreas Hülsing, Joost Rijneveld, and Peter Schwabe . 2016. ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM Public-Key Cryptography -- PKC 2016 (LNCS), Vol. Vol. 9614. 446--470.
[12]
Andreas Hülsing, Joost Rijneveld, and Fang Song . 2016. Mitigating Multi-target Attacks in Hash-Based Signatures Public-Key Cryptography -- PKC 2016 (LNCS), Vol. Vol. 9614. 387--416.
[13]
In Lee and Kyoochun Lee . 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons Vol. 58, 4 (2015), 431--440.
[14]
Shancang Li and Li Da Xu . 2017. Securing the Internet of Things. Syngress.
[15]
Kerry A. McKay, Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha . 2017. Report on Lightweight Cryptography. (2017).
[16]
Ralph C. Merkle . 1989. A Certified Digital Signature. In Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference (LNCS), Vol. Vol. 435. 218--238.
[17]
Peter W. Shor . 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. Vol. 26, 5 (1997), 1484--1509.

Cited By

View all
  • (2024)Secure authentication framework for IoT applications using a hash-based post-quantum signature schemeService Oriented Computing and Applications10.1007/s11761-024-00414-xOnline publication date: 14-Jun-2024
  • (2023)Privacy Preserving for Electronic Medical Record Sharing in Healthchain With Group SignatureIEEE Systems Journal10.1109/JSYST.2023.3302268(1-12)Online publication date: 2023
  • (2022)Hash-Based Signature for Flexibility Authentication of IoT DevicesWuhan University Journal of Natural Sciences10.1051/wujns/202227100127:1(1-10)Online publication date: 16-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
APKC '18: Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop
May 2018
66 pages
ISBN:9781450357562
DOI:10.1145/3197507
  • Program Chairs:
  • Keita Emura,
  • Jae Hong Seo,
  • Yohei Watanabe
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication protocol
  2. iot
  3. lightweight cryptography
  4. post-quantum cryptography
  5. stateful signature schemes

Qualifiers

  • Research-article

Conference

ASIA CCS '18
Sponsor:

Acceptance Rates

APKC '18 Paper Acceptance Rate 7 of 20 submissions, 35%;
Overall Acceptance Rate 36 of 103 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure authentication framework for IoT applications using a hash-based post-quantum signature schemeService Oriented Computing and Applications10.1007/s11761-024-00414-xOnline publication date: 14-Jun-2024
  • (2023)Privacy Preserving for Electronic Medical Record Sharing in Healthchain With Group SignatureIEEE Systems Journal10.1109/JSYST.2023.3302268(1-12)Online publication date: 2023
  • (2022)Hash-Based Signature for Flexibility Authentication of IoT DevicesWuhan University Journal of Natural Sciences10.1051/wujns/202227100127:1(1-10)Online publication date: 16-Mar-2022
  • (2021)An Application of p-Fibonacci Error-Correcting Codes to CryptographyMathematics10.3390/math90707899:7(789)Online publication date: 6-Apr-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media