Abstract
An electronic health (e-health) system, such as a medical cyber-physical system, offers a number of benefits (e.g. inform medical diagnosis). There are, however, a number of considerations in the implementation of the medical cyber-physical system, such as the integrity of medical / healthcare data (e.g. manipulated data can result in misdiagnosis). A number of digital signature schemes have been proposed in recent years to mitigate some of these challenges. However, the security of existing signatures is mostly based on conventional difficult mathematical problems, which are known to be insecure against quantum attacks. In this paper, we propose a certificateless signature scheme, based on NTRU lattice. The latter is based on the difficulty of small integer solutions on the NTRU lattice, and is known to be quantum attack resilience. Security analysis and performance evaluations demonstrate that our proposed scheme achieves significantly reduced communication and computation costs in comparison to two other competing quantum resilience schemes, while being quantum attack resilience.
Similar content being viewed by others
References
Lee I., Sokolsky O. (2010) Medical cyber physical systems. In: Design Automation Conference, pp 743–748. IEEE
Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41 (2): 303–332, 1999
Collins R.J., Donaldson R.J., Buller G.S. (2018) Progress in experimental quantum digital signatures. In: Quantum Communications and Quantum Imaging XVI, vol. 10771, pp. 107710F. International Society for Optics and Photonics
Krenn M., Huber M., Fickler R., Lapkiewicz R., Ramelow S., Zeilinger A. (2014) Generation and confirmation of a (100× 100)-dimensional entangled quantum system. In: Proceedings of the National Academy of Sciences, pp. 201402365
Lyubashevsky V., Micciancio D.: Asymptotically efficient lattice-based digital signatures. J. Cryptol. 31 (3): 774–797, 2018
Nejatollahi H., Dutt N., Ray S., Regazzoni F., Banerjee I., Cammarota R.: Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51 (6): 129, 2019
Tian M., Huang L.: Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 8 (8): 1575–1586, 2015
Xie J., Hu Y., Gao J., Gao W., Jiang M.: Efficient certificateless signature scheme on ntru lattice. KSII Transactions on Internet & Information Systems 10 (10): 5190–5208, 2016
Bai S., Lepoint T., Roux-Langlois A., Sakzad A., Stehlé D., Steinfeld R.: Improved security proofs in lattice-based cryptography: using the rényi divergence rather than the statistical distance. J. Cryptol. 31 (2): 610–640, 2018
Banerjee U., Ukyab T.S., Chandrakasan A.P. (2019) Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 17–61
Cash D., Hofheinz D., Kiltz E., Peikert C. (2010) Bonsai trees, or how to delegate a lattice basis. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 523–552. Springer
Liu Z., Choo K.-K.R., Grossschadl J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56 (2): 158–162, 2018
Ajtai M. (1996) Generating hard instances of lattice problems. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM
Micciancio D. (2011) Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715. Springer
Goldreich O., Goldwasser S., Halevi S. (1997) Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112–131. Springer
Hoffstein J., Pipher J., Silverman J.H. (2001) Nss: An ntru lattice-based signature scheme. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 211–228. Springer
Hoffstein J., Howgrave-Graham N., Pipher J., Silverman J.H., Whyte W. (2003) Ntrusign: Digital signatures using the ntru lattice. In: Cryptographers’ track at the RSA conference, pp. 122–140. Springer
Gentry C., Jonsson J., Stern J., Szydlo M. (2001) Cryptanalysis of the ntru signature scheme (nss) from eurocrypt 2001. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 1–20. Springer
Lyubashevsky V., Micciancio D. (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37–54. Springer
Gentry C., Peikert C., Vaikuntanathan V. (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM
Boyen X. (2010) Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499–517. Springer
Dov Gordon S., Katz J., Vaikuntanathan V. (2010) A group signature scheme from lattice assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 395–412. Springer
Laguillaumie F., Langlois A., Libert B., Stehlé D. (2013) Lattice-based group signatures with logarithmic signature size. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–61. Springer
Boneh D., Freeman D.M. (2011) Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: International Workshop on Public Key Cryptography, pp. 1–16. Springer
Boneh D., Freeman D.M. (2011) Homomorphic signatures for polynomial functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 149–168. Springer
Boneh D., Gentry C., Lynn B., Shacham H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416–432. Springer
Aguilar-Melchor C., Barrier J., Guelton S., Guinet A., Killijian M.-O., Lepoint T. (2016) Nfllib: Ntt-based fast lattice library. In: Cryptographers’ Track at the RSA Conference, pp. 341–356. Springer
Lee I., Sokolsky O., Chen S., Hatcliff J., Jee E., Kim B., King A., Mullen-Fortino M., Park S., Roederer A., et al.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100 (1): 75–90, 2011
Mitchell R., Chen R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12 (1): 16–30, 2014
Funding
This work is partially supported by the National Key Research and Development Program of China (No. 2018YFC1315404) and the National Natural Science Foundation of China under Grant 61902115, Grant 61932016, Grant 61972294, Grant 61772377, and Grant 61841701.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
All authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Xu, Z., He, D., Vijayakumar, P. et al. Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. J Med Syst 44, 92 (2020). https://doi.org/10.1007/s10916-020-1527-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-020-1527-7