LiteQSign: Lightweight and Quantum-Safe Signatures for Heterogeneous IoT Applications (2311.18674v6)
Abstract: The rapid proliferation of resource-constrained IoT devices across sectors like healthcare, industrial automation, and finance introduces major security challenges. Traditional digital signatures, though foundational for authentication, are often infeasible for low-end devices with limited computational, memory, and energy resources. Also, the rise of quantum computing necessitates post-quantum (PQ) secure alternatives. However, NIST-standardized PQ signatures impose substantial overhead, limiting their practicality in energy-sensitive applications such as wearables, where signer-side efficiency is critical. To address these challenges, we present LightQSign (LightQS), a novel lightweight PQ signature that achieves near-optimal signature generation efficiency with only a small, constant number of hash operations per signing. Its core innovation enables verifiers to obtain one-time hash-based public keys without interacting with signers or third parties through secure computation. We formally prove the security of LightQSign in the random oracle model and evaluate its performance on commodity hardware and a resource-constrained 8-bit AtMega128A1 microcontroller. Experimental results show that LightQSign outperforms NIST PQC standards with lower computational overhead, minimal memory usage, and compact signatures. On an 8-bit microcontroller, it achieves up to 1.5-24x higher energy efficiency and 1.7-22x shorter signatures than PQ counterparts, and 56-76x better energy efficiency than conventional standards-enabling longer device lifespans and scalable, quantum-resilient authentication.
- 6G internet of things: A comprehensive survey, IEEE Internet of Things Journal (2021).
- Digital twin networks: A survey, IEEE Internet of Things Journal 8 (2021) 13789–13804.
- Technologies trend towards 5G network for smart health-care using iot: A review, Sensors 20 (2020) 4047.
- M. Pradhan, J. Noll, Security, privacy, and dependability evaluation in verification and validation life cycles for military iot systems, IEEE Communications Magazine 58 (2020) 14–20.
- Y.-H. Joung, Development of implantable medical devices: from an engineering perspective, International neurourology journal 17 (2013) 98.
- P. B. Adamson, Pathophysiology of the transition from chronic compensated and acute decompensated heart failure: new insights from continuous monitoring devices, Current heart failure reports 6 (2009) 287–292.
- Transition from chronic compensated to acute decompensated heart failure: pathophysiological insights obtained from continuous monitoring of intracardiac pressures, Circulation 118 (2008) 1433–1441.
- Heart disease and stroke statistics—2020 update: a report from the american heart association, Circulation 141 (2020) e139–e596.
- R. Behnia, A. A. Yavuz, Towards practical post-quantum signatures for resource-limited internet of things, in: Annual Computer Security Applications Conference, 2021, pp. 119–130.
- A. Mudgerikar, E. Bertino, Iot attacks and malware, Cyber Security Meets Machine Learning (2021) 1–25.
- Security challenges for medical devices, Communications of the ACM 58 (2015) 74–82.
- Post-quantum forward-secure signatures with hardware-support for internet of things, IEEE International Conference on Communications (ICC), IEEE, 2023, p. 1–7.
- Security and privacy issues in implantable medical devices: A comprehensive survey, Journal of biomedical informatics 55 (2015) 272–289.
- Rfid guardian: A battery-powered mobile device for rfid privacy management, in: Australasian Conference on Information Security and Privacy, Springer, 2005, pp. 184–194.
- Access control for implantable medical devices, IEEE Transactions on Emerging Topics in Computing 9 (2020) 1126–1138.
- Medmon: Securing medical devices through wireless monitoring and anomaly detection, IEEE Transactions on Biomedical circuits and Systems 7 (2013) 871–881.
- Security and privacy for implantable medical devices, IEEE pervasive computing 7 (2008) 30–39.
- P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM review 41 (1999) 303–332.
- J.-P. Aumasson, The impact of quantum computing on cryptography, Computer Fraud & Security 2017 (2017) 8–11.
- Envisioning the future of cyber security in post-quantum era: A survey on pq standardization, applications, challenges and opportunities, arXiv preprint arXiv:2310.12037 (2023).
- Securing the internet of things in a quantum world, IEEE Communications Magazine 55 (2017) 116–120.
- A post-quantum compliant authentication scheme for iot healthcare systems, IEEE Internet of Things Journal (2023).
- S. E. Nouma, A. A. Yavuz, Trustworthy and efficient digital twins in post-quantum era with hybrid hardware-assisted signatures, ACM Transactions on Multimedia Computing, Communications and Applications 20 (2024) 1–30.
- Security vulnerabilities in mobile health applications, in: 2018 IEEE Conference on application, information and network security (AINS), IEEE, 2018, pp. 21–26.
- A comprehensive model for securing sensitive patient data in a clinical scenario, IEEE Access 11 (2023) 137083–137098.
- S. E. Nouma, A. A. Yavuz, Practical cryptographic forensic tools for lightweight internet of things and cold storage systems, in: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023, pp. 340–353.
- A high-speed public-key signature scheme for 8-b iot-constrained devices, IEEE Internet of Things Journal 7 (2020) 3663–3677.
- C. Costello, P. Longa, SchnorrQ: Schnorr signatures on fourQ, MSR Tech Report, 2016 (2016).
- Crystals-dilithium: A lattice-based digital signature scheme, IACR Transactions on Cryptographic Hardware and Embedded Systems (2018) 238–268.
- Management of resource constrained devices in the internet of things, IEEE Communications Magazine 50 (2012) 144–149.
- Falcon: Fast-fourier lattice-based compact signatures over NTRU, Submission to the NIST’s post-quantum cryptography standardization process (2018).
- Lattice signatures and bimodal gaussians, in: Cryptology Conf., 2013, pp. 40–56.
- E. Karabulut, A. Aysu, Falcon down: Breaking falcon post-quantum signature scheme through side-channel attacks, in: 2021 58th ACM/IEEE Design Automation Conference (DAC), 2021, pp. 691–696.
- M. Tibouchi, A. Wallet, One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips, Journal of Mathematical Cryptology 15 (2021) 131–142.
- A. A. Yavuz, M. O. Ozmen, Ultra lightweight multiple-time digital signature for the internet of things devices, IEEE Transactions on Services Computing (2019) 215–227.
- Cb-cas: Certificate-based efficient signature scheme with compact aggregation for industrial internet of things environment, IEEE Internet of Things Journal 7 (2019) 2563–2572.
- A secure certificateless signcryption scheme without pairing for internet of medical things, IEEE Internet of Things Journal 10 (2022) 9136–9147.
- Idenmultisig: Identity-based decentralized multi-signature in internet of things, IEEE Transactions on Computational Social Systems (2023).
- Security analysis of an identity-based signature from factorization problem, IEEE Access 8 (2020) 23277–23283.
- The SPHINCS+ signature framework, in: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, 2019, pp. 2129–2146.
- L. Reyzin, N. Reyzin, Better than BiBa: Short one-time signatures with fast signing and verifying, in: Australasian Conference on Information Security and Privacy, 2002, pp. 144–153.
- Optimal parameters for XMSS MT, in: International conference on availability, reliability, and security, 2013, pp. 194–208.
- R. C. Merkle, A certified digital signature, in: Conference on the Theory and Application of Cryptology, Springer, 1989, pp. 218–238.
- Beyond basic trust: Envisioning the future of nextgen networked systems and digital signatures, in: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), IEEE Computer Society, 2023, pp. 267–276.
- Zero knowledge protocols and signatures from the restricted syndrome decoding problem, in: IACR International Conference on Public-Key Cryptography, Springer, 2024, pp. 243–274.
- W. Beullens, Mayo: practical post-quantum signatures from oil-and-vinegar maps, in: International Conference on Selected Areas in Cryptography, Springer, 2021, pp. 355–376.
- Aim: symmetric primitive for shorter signatures with stronger security, in: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, pp. 401–415.
- An efficient quantum-resistant undeniable signature protocol for the e-voting system, Journal of Information Security and Applications 81 (2024) 103714.
- S. Shaw, R. Dutta, Post-quantum secure identity-based signature achieving forward secrecy, Journal of Information Security and Applications 69 (2022) 103275.
- On the security of multivariate-based ring signature and other related primitives, Journal of Information Security and Applications 74 (2023) 103474.
- General fault attacks on multivariate public key cryptosystems, in: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings 4, Springer, 2011, pp. 1–18.
- Scb: Flexible and efficient asymmetric computations utilizing symmetric cryptosystems implemented with intel sgx, in: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), IEEE, 2021, pp. 1–8.
- K. Sedghighadikolaei, A. A. Yavuz, A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications, arXiv preprint arXiv:2311.05514 (2023).
- Optimal parameters for XMSS^ MT, Cryptology ePrint Archive, Paper 2017/966 (2017).
- Aris: authentication for real-time iot systems, in: ICC 2019-2019 IEEE International Conference on Communications (ICC), IEEE, 2019, pp. 1–6.
- A. A. Yavuz, Eta: efficient and tiny and authentication for heterogeneous wireless systems, in: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, 2013, pp. 67–72.
- A guide to fully homomorphic encryption, Cryptology Archive (2015).
- (leveled) fully homomorphic encryption without bootstrapping, ACM Transactions on Computation Theory (TOCT) 6 (2014) 1–36.
- Y. Yu, X. Xie, Privacy-preserving computation in the post-quantum era, National Science Review 8 (2021). doi:10.1093/nsr/nwab115, nwab115.
- B. Preneel, Davies-meyer hash function, in: Encyclopedia of Cryptography and Security, 2005, pp. 136–136.
- S. E. Nouma, A. A. Yavuz, Trustworthy and efficient digital twins in post-quantum era with hybrid hardware-assisted signatures, ACM Trans. Multimedia Comput. Commun. Appl. 20 (2024).
- Notions, definitions, and models, Introduction to Security Reduction (2018) 5–12.
- S. Darzi, A. A. Yavuz, Pqc meets ml or ai: Exploring the synergy of machine learning and post-quantum cryptography, Authorea Preprints (2024).
- S. Mella, R. Susella, On the homomorphic computation of symmetric cryptographic primitives, in: Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, IMACC 2013, Springer-Verlag, Berlin, Heidelberg, 2013, p. 28–44.
- Tfhe: fast fully homomorphic encryption over the torus, Journal of Cryptology 33 (2020) 34–91.
- Practical homomorphic evaluation of block-cipher-based hash functions with applications, in: International Symposium on Foundations and Practice of Security, Springer, 2022, pp. 88–103.
- Fregata: Faster homomorphic evaluation of aes via tfhe, in: International Conference on Information Security, Springer, 2023, pp. 392–412.
- S. Hirose, Some plausible constructions of double-block-length hash functions, in: Fast Software Encryption, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 210–225.
- S. Halevi, V. Shoup, Design and implementation of HElib: a homomorphic encryption library, Cryptology Archive (2020).
- The elliptic curve digital signature algorithm (ECDSA), International journal of information security 1 (2001) 36–63.
- High-speed high-security signatures, Journal of cryptographic engineering 2 (2012) 77–89.
- G. Hofemeier, R. Chesebrough, Introduction to intel aes-ni and intel secure key instructions, Intel, White Paper 62 (2012).
- High-performance ideal lattice-based cryptography on 8-bit atxmega microcontrollers, in: International conference on cryptology and information security in Latin America, Springer, 2015, pp. 346–365.
- Short signatures from the weil pairing, in: International conference on the theory and application of cryptology and information security, Springer, 2001, pp. 514–532.
- J. Howe, B. Westerbaan, Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7, Paper 2022/405, Cryptology ePrint Archive (2022).