Affiliation:
1. State Grid Smart Grid Research Institute Co., Ltd., Beijing 102200, China
2. State Grid Key Laboratory of Information & Network, Nanjing 211100, China
3. State Grid Anhui Electric Power Co., Ltd., Information & Telecommunication Branch, Hefei 230061, China
Abstract
Mobile sensors enjoy the advantages of easy installation and low consumption, which have been widely adopted in many information systems. In those systems where data are generated rapidly, the throughput of the sensors is one of the most fundamental factors that determine the system functionality. For example, to guarantee data integrity, digital signature techniques can be applied. In many practical scenarios, such as the smart grid system, data are generated rapidly and, hence, the signature together with the data must also be transmitted and verified in time. This requires the mobile sensors to support a high-throughput data processing ability. In this setting, how to achieve efficient signature schemes supporting batch verification must be considered. Many signatures, such as the original national cryptographic standard, namely, the SM2 algorithm, do not support batch verification and are in a public-key infrastructure setting. In this paper, we propose a SM2-based certificateless signature scheme with batch verification, which is suitable for the aforementioned environment. The scheme extends the Chinese cryptographic standard SM2 algorithm to the certificateless setting and multiple signatures can be verified simultaneously. Another advantage of this scheme is that its signing phase does not involve any pairing operation. The verification phase only requires a constant pairing operation, which is not related to the number of signatures to be verified. The construction is generic and can be instantiated using any traditional signature scheme.
Funder
State Grid Corporation of China
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference29 articles.
1. Identity-Based Cryptosystems and Signature Schemes;Blakley;Advances in Cryptology: Proceedings of CRYPTO 84 4,1984
2. Identity-Based Encryption from the Weil Pairing;Kilian;Proceedings of the Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference,2001
3. FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme;Zhang;IEEE J. Sel. Areas Commun.,2022
4. Zhang, C., Hu, C., Wu, T., Zhu, L., and Liu, X. (2022). Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments. IEEE Trans. Dependable Secur. Comput., early access.
5. Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud;Hu;IEEE Trans. Inf. Forensics Secur.,2023