|Table of Contents|

Threshold attestation scheme for internet of things based on trust value(PDF)


Research Field:
Publishing date:


Threshold attestation scheme for internet of things based on trust value
Zhou Caiqiu1Yang Yuwang1Liu Jianli2Ning Zhenhu2Li Mengkun3
1.School of Computer Science and Engineering,Nanjing University of Science and Technology, Nanjing 210094,China; 2.Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China; 3.School of Management,Capital Normal University,
internet of things threshold attestation trust value nodes
A threshold signature scheme completed by multiple nodes of the internet of things(IoT)is proposed based on credibility to improve the efficiency of trustworthiness certification. When the sum of the creditability of the nodes participating in the signature is greater than the threshold value or equal,the role of the node playing in the proof is greater; on the contrary is smaller. The security analysis and example verification show that,the proposed scheme can resist the conspiracy attack of any node when the sum of the creditability of the nodes participating in the attack is smaller than the threshold value,and can reduce the burden of the IOT nodes effectively while ensuring the security.


[1] Roman R,Zhou Jianying, Lopez J. On the features and challenges of security and privacy in distributed internet of things[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking,2013,57(10):2266-2279. [2]徐小涛,杨志红. 物联网信息安全[M]. 北京:人民邮电出版社,2012. [3]付嵘. 物联网共享平台中安全隐私保护的研究与实现[D]. 北京:北京交通大学计算机与信息技术学院,2011. [4]刘刚,张宏,李千目. 基于博弈模型的网络安全最优攻防决策方法[J]. 南京理工大学学报,2014,38(1):13-21. Liu Gang,Zhang Hong,Li Qianmu. Network security optimal attack and defense decision-making method based on game model[J]. Journal of Nanjing University of Science and Technology,2014,38(1):13-21. [5]宁振虎. 物联网感知层可信关键技术研究[D]. 北京:北京工业大学软件学院,2016. [6]Gong Bei,Zhang Yu,Wang Yubo. A remote attestation mechanism for the sensing layer nodes of the internet of things[J]. Future Generation Computer Systems,2018,78(3):867-886. [7]Desmedt Y G,Frankel Y. Threshold cryptosystems[C]//Proceedings on Advances in Cryptology. Santa Barbara,California,USA:Springer-Verlag New York,Inc.,1989:307-315. [8]Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C]//Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology. London,UK:Springer-Verlag,1991:457-469. [9]De Santis A,Desmedt Y,Frankel Y,et al. How to share a function securely[C]//Proceedings of the Twenty-sixth Annual ACM Symposium on Theory of Computing. New York,NY,USA:ACM,1994:522-533. [10]Gennaro R,Jarecki S,Krawczyk H,et al. Robust threshold DSS signatures[J]. Information and Computation,2001,164(1):54-84. [11]Shamir A. How to share a secret[J]. Communications of the ACM,1979,22( 11):612-613. [12]Wang C T,Lin C H,Chang C C. Threshold signature schemes with traceable signers in group communi-cations[J]. Computer Communications,1998,21(8):771-776. [13]Pedersen T P. A threshold cryptosystem without a trusted party[C]//Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques. Berlin,Germany:Springer-Verlag Berlin,Heidelberg,1991:522-526. [14]邱卫东,黄征,李祥学,等. 密码协议基础[M]. 北京:高等教育出版社,2009. [15]冯登国. 安全协议:理论与实践[M]. 北京:清华大学出版社,2011. [16]Chen Weidong,Feng Dengguo. A group of threshold group-signature schemes with privilege subsets[J]. Journal of Software,2005,16(7):1289-1295. [17]黄东平,刘铎,戴一奇. 加权门限秘密共享[J]. 计算机研究与发展,2007,44(8):1378-1382. Huang Dongping,Liu Duo,Dai Yiqi. Research and development of weighted threshold secret sharing[J]. Journal of Computer Research and Development,2007,44(8):1378-1382. [18]王静,刘焕平. 加权门限秘密共享方案[J]. 哈尔滨师范大学自然科学学报,2011,27(3):23-25. Wang Jing,Liu Huanping. Weighted threshold secret sharing scheme[J]. Natural Science Journal of Harbin Normal University,2011,27(3),23-25. [19]郭成,张真诚,秦川,等.具有加权特写的门限认证加密机制[J].应用科学学报,2012,30(3):251-155. Guo Cheng,Zhang Zhencheng,Qin Chuan,et al. Encryption scheme for weighted threshold authentication[J]. Journal of Applied Science,2012,30(3):251-155. [20]Drgan C C, iplea L F. Distributive weighted threshold secret sharing schemes[J]. Information Sciences,2016,339:85-97.


Last Update: 2018-06-30