Rapid advances in wireless communications, hardware/software, and Internet technologies have contributed to an exponential growth in the number of users accessing the Internet using mobile, wearable or other Internet of Things devices. Identity-based signature schemes have been widely applied to enforce user authorization and validate user messages in mobile wireless networks. However, the user's private key used to generate signatures is prone to leakage because the key is being stored on the mobile device. Several (t, n) threshold secret sharing schemes have been proposed to address the issue. One limitation is that the private keys in most of those schemes have to be recovered on a single device when generating signatures, so that the user who holds the device can sign any message without the participation of other users. To address the recovery limitation, we propose an efficient and secure two-party distributed signing protocol for the identity-based signature scheme in the IEEE P1363 Standard, where two users can generate a valid signature without recovering the whole private key. We formally prove its security under a nonstandard assumption. We also implemented our proposed protocol using the MIRACL Cryptographic software development kit. The experimental results obtained show that the time it takes for two general Android devices to generate a signature is about 709.53 ms.
|Number of pages||10|
|Journal||IEEE Internet of Things Journal|
|State||Published - Dec 2018|
Bibliographical noteFunding Information:
Manuscript received March 17, 2018; revised May 28, 2018 and July 26, 2018; accepted August 7, 2018. Date of publication August 14, 2018; date of current version January 16, 2019. This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB0802500, in part by the National Natural Science Foundation of China under Grant 61572370, Grant 61572379, Grant 61802006, and Grant 61501333, and in part by the open fund of the Guangxi Key Laboratory of Trusted Software under Grant kx201529. The work of K.-K. R. Choo was supported by the Cloud Technology Endowed Professorship. (Corresponding author: Debiao He.) Y. Zhang and D. He are with the Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430000, China, and also with the Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China (e-mail: firstname.lastname@example.org; email@example.com).
© 2014 IEEE.
- Distributed signing
- IEEE P1363 Standard
- Mobile device
- Provable security
ASJC Scopus subject areas
- Signal Processing
- Information Systems
- Hardware and Architecture
- Computer Science Applications
- Computer Networks and Communications