Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3372195
|View full text |Cite
|
Sign up to set email alerts
|

LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems

Abstract: Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control decisions according to the received sensor data. Due to the existence of spoofing attacks (more specifically to CPS, false data injection attacks), one has to protect the authenticity and integrity of the transmitt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 41 publications
(44 reference statements)
0
10
0
Order By: Relevance
“…In this paper, we first show that OM-UEA schemes can be implemented using digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. Furthermore, we instantiate our construction with the lightweight signature scheme recently proposed by Yang et al [2] and show that it results in a onemessage unilateral entity authentication scheme that requires low computational effort, as well as low storage overhead, for the prover. Specifically, to compute each authentication message the prover only needs to perform two modular multiplications and three modular additions.…”
Section: Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we first show that OM-UEA schemes can be implemented using digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. Furthermore, we instantiate our construction with the lightweight signature scheme recently proposed by Yang et al [2] and show that it results in a onemessage unilateral entity authentication scheme that requires low computational effort, as well as low storage overhead, for the prover. Specifically, to compute each authentication message the prover only needs to perform two modular multiplications and three modular additions.…”
Section: Contributionmentioning
confidence: 99%
“…Yang et al [2] proposed a lightweight signature framework, called LiS, which is suitable for continuous message authentication in IoT applications. Such a framework includes two signature schemes, called LiS1 and LiS2.…”
Section: Related Workmentioning
confidence: 99%
“…The first phases of El-Gamal [30], DSS [31], and precomputation enabled ECDSA [7] do not require the true message similar to our Tree Construction procedure. Online/offline signatures, either based on one-time signature schemes [32] or based on chameleon commitments [26], [33], [34] can transform any digital signature scheme to a one with such offloading feature. The idea is to perform expensive cryptographic operations in the offline phase and generate a meta-data, so that in the online phase the source can sign a message only using inexpensive computations.…”
Section: Related Workmentioning
confidence: 99%
“…Although the online signing in online/offline converted signature schemes can be fast, these schemes still fall short in meeting stringent latency requirements due to their offline phase or require a large volume of metadata to be stored by the source. Among these, Lis [34] is specifically designed for cyberphysical systems. However, it is optimized for the publisher, and thus, the verification cost is still high.…”
Section: Related Workmentioning
confidence: 99%
“…A,ASE (κ, q e ) denote the advantage of A in breaking the security of ASE, where q e is the number of encryption oracle queries that A can ask. Also, we let Adv CRHF A,H (κ) denote the advantage of A in breaking the collision-resistant property of H. We refer the reader to [23,28,51] for the formal definitions of these advantages. We omit them here to save space.…”
Section: Proof Of Theorem 42mentioning
confidence: 99%