Trustworthy and Efficient Digital Twins in Post-Quantum Era with Hybrid Hardware-Assisted Signatures

Author:

Nouma Saif E.1,Yavuz Attila A.1

Affiliation:

1. University of South Florida, USA

Abstract

Digital Twins (DT) virtually model cyber-physical objects via sensory inputs by simulating or monitoring their behavior. Therefore, DTs usually harbor vast quantities of Internet of Things (IoT) components (e.g., sensors) that gather, process, and offload sensitive information (e.g., healthcare) to the cloud. It is imperative to ensure the trustworthiness of such sensitive information with long-term and compromise-resilient security guarantees. Digital signatures provide scalable authentication and integrity with non-repudiation and are vital tools for DTs. Post-quantum cryptography (PQC) and forward-secure signatures are two fundamental tools to offer long-term security and breach resiliency. However, NIST-PQC signature standards are exorbitantly costly for embedded DT components and are infeasible when forward-security is also considered. Moreover, NIST-PQC signatures do not admit aggregation, which is a highly desirable feature to mitigate the heavy storage and transmission burden in DTs. Finally, NIST recommends hybrid PQ solutions to enable cryptographic agility and transitional security. Yet, there is a significant gap in the state of the art in the achievement of all these advanced features simultaneously. Therefore, there is a significant need for lightweight digital signatures that offer compromise resiliency and compactness while permitting transitional security into the PQ era for DTs. We create a series of highly lightweight digital signatures called Hardware-ASisted Efficient Signature ( HASES ) that meets the above requirements. The core of HASES  is a hardware-assisted cryptographic commitment construct oracle ( CCO ) that permits verifiers to obtain expensive commitments without signer interaction. We created three HASES  schemes: PQ-HASES  is a forward-secure PQ signature, LA-HASES  is an efficient aggregate Elliptic-Curve signature, and HY-HASES  is a novel hybrid scheme that combines PQ-HASES  and LA-HASES  with novel strong nesting and sequential aggregation. HASES  does not require a secure-hardware on the signer. We prove that HASES  schemes are secure and implemented them on commodity hardware and and 8-bit AVR ATmega2560. Our experiments confirm that PQ-HASES  and LA-HASES  are two magnitudes of times more signer efficient than their PQ and conventional-secure counterparts, respectively. HY-HASES  outperforms NIST PQC and conventional signature combinations, offering a standard-compliant transitional solution for emerging DTs. We open-source HASES  schemes for public-testing and adaptation.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture

Reference61 articles.

1. Moayad Aloqaily , Ouns Bouachir , Fakhri Karray , Ismaeel Al Ridhawi , and Abdulmotaleb El Saddik . 2022. Integrating Digital Twin and Advanced Intelligent Technologies to Realize the Metaverse . IEEE Consumer Electronics Mag .( 2022 ). Moayad Aloqaily, Ouns Bouachir, Fakhri Karray, Ismaeel Al Ridhawi, and Abdulmotaleb El Saddik. 2022. Integrating Digital Twin and Advanced Intelligent Technologies to Realize the Metaverse. IEEE Consumer Electronics Mag.(2022).

2. Gaspard Anthoine , Jean-Guillaume Dumas , Mélanie de Jonghe , Aude Maignan , Clément Pernet , Michael Hanling , and Daniel  S Roche . 2021 . Dynamic proofs of retrievability with low server storage . In 30th USENIX Security Symposium (USENIX Security 21) . 537–554. Gaspard Anthoine, Jean-Guillaume Dumas, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Michael Hanling, and Daniel S Roche. 2021. Dynamic proofs of retrievability with low server storage. In 30th USENIX Security Symposium (USENIX Security 21). 537–554.

3. Scalable and efficient provable data possession

4. Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications;Bagchi Prithwi;IEEE Internet of Things Magazine,2023

5. Recommendation for key-derivation methods in key-establishment schemes;Barker Elaine;NIST Special Publication,2018

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things;ACM Transactions on Multimedia Computing, Communications, and Applications;2024-03-08

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3