{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:14:45Z","timestamp":1760242485104,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T00:00:00Z","timestamp":1505347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emerged and attracted the interest of researchers and engineers. A multi-signature enables the data aggregation through one signature to authenticate various signers on the acknowledgement of a message, which is quite fit for data authenticated aggregation marine WSNs. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving heavy computational overhead or the management of certificates, which cannot be afforded by the marine wireless sensors. Combined with the concept of identity-based cryptography, a few pairing-free identity-based multi-signature (IBMS) schemes have been designed on the basis of the integer factorization problem. In this paper, we propose two efficient IBMS schemes that can be used to construct provably secure data authenticated aggregation protocols under the cubic residue assumption, which is equal to integer factorization. We also employ two different methods to calculate a cubic root for the cubic residue number during the signer\u2019s private key extraction. The algorithms are quite efficient compared to the previous work, especially for the algorithms of the multi-signature generation and its verification.<\/jats:p>","DOI":"10.3390\/s17092117","type":"journal-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T10:04:49Z","timestamp":1505383489000},"page":"2117","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0243-9995","authenticated-orcid":false,"given":"Lifei","family":"Wei","sequence":"first","affiliation":[{"name":"College of Information Technology, Shanghai Ocean University, Shanghai 201306, China"}]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Technology, Shanghai Ocean University, Shanghai 201306, China"}]},{"given":"Dongmei","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Technology, Shanghai Ocean University, Shanghai 201306, China"}]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China"}]},{"given":"Liang","family":"Dai","sequence":"additional","affiliation":[{"name":"College of Information Technology, Shanghai Ocean University, Shanghai 201306, China"}]},{"given":"Guojian","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Technology, Shanghai Ocean University, Shanghai 201306, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,9,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.inffus.2016.04.007","article-title":"Spatial anomaly detection in sensor networks using neighborhood information","volume":"33","author":"Bosman","year":"2017","journal-title":"Inform. Fusion J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.adhoc.2015.07.013","article-title":"Ensembles of incremental learners to detect anomalies in ad hoc sensor networks","volume":"35","author":"Bosman","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ahn, J., Green, M., and Hohenberger, S. (2010, January 4\u20138). Synchronized aggregate signatures: New definitions, constructions and applications. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, IL, USA.","DOI":"10.1145\/1866307.1866360"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wei, L., Zhang, L., Huang, D., and Zhang, K. (2017, January 16\u201318). Efficient and Provably Secure Identity-based Multi-Signature Schemes for Data Aggregation in Marine Wireless Sensor Networks. Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control (ICNSC 2017), Calabria, Italy.","DOI":"10.1109\/ICNSC.2017.8000158"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/571594","article-title":"Modeling and analysis in marine big data: Advances and challenges","volume":"2015","author":"Huang","year":"2015","journal-title":"Math. Probl. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1002\/sec.600","article-title":"Secure identity-based multisignature schemes under quadratic residue assumptions","volume":"6","author":"Wei","year":"2013","journal-title":"Secur. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hsiao, H., Studer, A., Chen, C., Perrig, A., Bai, F., Bellur, B., and Iyer, A. (2011, January 20\u201322). Flooding-resilient broadcast authentication for vanets. Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MOBICOM 2011), Las Vegas, NV, USA.","DOI":"10.1145\/2030613.2030635"},{"key":"ref_8","first-page":"1","article-title":"A public-key cryptosystem suitable for digital multisignatures","volume":"71","author":"Itakura","year":"1983","journal-title":"NEC Res. Dev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1145\/1151690.1151692","article-title":"Energy-aware lossless data compression","volume":"24","author":"Barr","year":"2006","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., Cheon, J., and Jarecki, S. (2008, January 27\u201331). Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, VA, USA.","DOI":"10.1145\/1455770.1455827"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10623-009-9313-z","article-title":"Efficient discrete logarithm based multi-signature scheme in the plain public key model","volume":"54","author":"Ma","year":"2010","journal-title":"Des. Codes Cryptogr."},{"key":"ref_12","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based cryptosystems and signature schemes. Proceedings of the 4th International Cryptology Conference (CRYPTO 1984), Santa Barbara, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the Weil pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM J. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cocks, C. (2001, January 17\u201319). An Identity Based Encryption Scheme Based on Quadratic Residues. Proceedings of the 8th IMA International Conference on Cryptography and Coding, Cirencester, UK.","DOI":"10.1007\/3-540-45325-3_32"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Gentry, C., and Ramzan, Z. (2006, January 24\u201326). Identity-based aggregate signatures. Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC 2006), New York, NY, USA.","DOI":"10.1007\/11745853_17"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TPDS.2011.95","article-title":"BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks","volume":"23","author":"Lu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhang, K., Wei, L., Li, X., and Qian, H. (2017, January 19\u201321). Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017), Guilin, China.","DOI":"10.1007\/978-3-319-60033-8_19"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.future.2015.11.012","article-title":"A Pairing-Free Certificate-Based Proxy Re-encryption Scheme for Secure Data Sharing in Public Clouds","volume":"62","author":"Lu","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Neven, G. (2007, January 5\u20139). Identity-Based Multi-signatures from RSA. Proceedings of the Cryptographers Track at the RSA Conference (CT-RSA 2007), San Francisco, CA, USA.","DOI":"10.1007\/11967668_10"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., and Jarecki, S. (2010, January 26\u201328). Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Paris, France.","DOI":"10.1007\/978-3-642-13013-7_28"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s12652-011-0093-8","article-title":"Improving an efficient id-based rsa multisignature","volume":"4","author":"Yang","year":"2011","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11432-007-0038-1","article-title":"Identity-based signature scheme based on quadratic residues","volume":"50","author":"Chai","year":"2007","journal-title":"Sci. China Inform. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1007\/s11432-011-4413-6","article-title":"Identity based signature scheme based on cubic residues","volume":"54","author":"Xing","year":"2011","journal-title":"Sci. China Inform. Sci."},{"key":"ref_24","first-page":"33","article-title":"Provably secure and efficient identity-based signature scheme based on cubic residues","volume":"14","author":"Wang","year":"2012","journal-title":"Int. J. Netw. Secur."},{"key":"ref_25","first-page":"778","article-title":"Secure and efficient identity-based proxy multisignature using cubic residues","volume":"42","author":"Wang","year":"2013","journal-title":"J. Univ. Electr. Sci. Technol. China"},{"key":"ref_26","first-page":"90","article-title":"Secure and efficient identity-based proxy multi-signature using cubic residues","volume":"18","author":"Wang","year":"2016","journal-title":"Int. J. Netw. Secur."},{"key":"ref_27","first-page":"75","article-title":"Efficient identtiy based threshold ring signature based on cubic residues","volume":"59","author":"Wang","year":"2013","journal-title":"J. Wuhan Univ. (Nat. Sci.)"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wei, L., Zhang, L., Zhang, K., and Dong, M. (2015, January 10\u201312). An Efficient and Secure Delegated Multi-Authentication Protocol for Mobile Data Owners in Cloud. Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA15), Qufu, China.","DOI":"10.1007\/978-3-319-21837-3_60"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3777","DOI":"10.1002\/sec.1490","article-title":"Medaps: Secure multi-entities delegated authentication protocols for mobile cloud computing","volume":"9","author":"Zhang","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.jsc.2004.02.006","article-title":"Efficient algorithms for gcd and cubic residuosity in the ring of Eisenstein integers","volume":"39","author":"Damgard","year":"2005","journal-title":"J. Symb. Comput."},{"key":"ref_31","unstructured":"Benhamouda, F., Herranz, J., Joye, M., and Libert, B. (2016). Efficient cryptosystems from 2k. J. Cryptol., 1\u201331."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Coron, J. (2000, January 20\u201324). On the exact security of full domain hash. Proceedings of the 20th Annual International Cryptology Conference (CRYPTO 2000), Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44598-6_14"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1002\/dac.1330","article-title":"An efficient and provably-secure certificateless signature scheme without bilinear pairings","volume":"25","author":"He","year":"2012","journal-title":"Int. J. Commun. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2117\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:44:53Z","timestamp":1760208293000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,14]]},"references-count":33,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["s17092117"],"URL":"https:\/\/doi.org\/10.3390\/s17092117","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,9,14]]}}}