Optimized Lattice-Based Digital Signatures for Secure IoT Communication
DOI:
https://doi.org/10.17605.Keywords:
Lattice-Based Cryptography, Internet of Things (IoT) Security, Post-Quantum Cryptography, Digital Signature Scheme, Short Integer Solution (SIS) ProblemAbstract
A lightweight, robust, and efficient security mechanism is necessary to combat quantum-generation threats across multiple domains, including healthcare, transportation, and industrial automation, in the Internet of Things (IoT). Post-quantum cryptography has emerged in response to the increasing vulnerability of traditional cryptographic methods, such as RSA and ECC, to quantum attacks. Taking advantage of the hardness of Short Integer Solutions (SIS) and Learning with Errors (LWE), we propose a lattice-based signature scheme for IoT applications. A computationally efficient IoT device model that maintains authenticated, integrity, and anonymity is proposed. The scheme has the advantage of being faster and more efficient than existing key size schemes such as IBS, CLS, and FALCON, according to a detailed security assessment. The proposed scheme maintains practical deployment ability while reducing post-quantum security in IoT ecosystems.
References
A. E. Omolara et al., “The internet of things security: A survey encompassing unexplored areas and new insights,” Computers & Security, vol. 112, p. 102494, Jan. 2022, doi: 10.1016/j.cose.2021.102494.
A. Ghubaish, T. Salman, M. Zolanvari, D. Unal, A. Al-Ali, and R. Jain, “Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security,” IEEE Internet Things J., vol. 8, no. 11, pp. 8707–8718, Jun. 2021, doi: 10.1109/JIOT.2020.3045653.
P. Rani, J. Kumar, S. Singh, P. Dey, and L. H. Jasim, “Decoding the Aspects of Intelligent Traffic Management,” in Artificial Intelligence Technologies for Smart and Sustainable Urban Transportation, 1st ed., P. Raj, S. Yadav, M. K. Mishra, S. P. Yadav, and V. H. C. Albuquerque, Eds., Wiley, 2025, pp. 287–300. doi: 10.1002/9781394346776.ch17.
P. Rani, R. Kumar, A. Singh, J. Jagtap, and M. Almusawi, “Testifying the Criticality of the Internet of Things (IoT), 5G and AI: A Perfect Combination for Battery Management,” in Artificial Intelligence Technologies for Smart and Sustainable Urban Transportation, 1st ed., P. Raj, S. Yadav, M. K. Mishra, S. P. Yadav, and V. H. C. Albuquerque, Eds., Wiley, 2025, pp. 71–87. doi: 10.1002/9781394346776.ch5.
C. Ma and M. Jiang, “Practical Lattice-Based Multisignature Schemes for Blockchains,” IEEE Access, vol. 7, pp. 179765–179778, 2019, doi: 10.1109/ACCESS.2019.2958816.
M. Kansal, A. K. Singh, and R. Dutta, “Efficient Multi-Signature Scheme Using Lattice,” The Computer Journal, vol. 65, no. 9, pp. 2421–2429, Sep. 2022, doi: 10.1093/comjnl/bxab077.
V. Chamola, A. Jolfaei, V. Chanana, P. Parashari, and V. Hassija, “Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography,” Computer Communications, vol. 176, pp. 99–118, Aug. 2021, doi: 10.1016/j.comcom.2021.05.019.
A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” in Advances in Cryptology, vol. 196, G. R. Blakley and D. Chaum, Eds., in Lecture Notes in Computer Science, vol. 196. , Berlin, Heidelberg: Springer Berlin Heidelberg, 1985, pp. 47–53. doi: 10.1007/3-540-39568-7_5.
D. S. Gupta and G. P. Biswas, “Design of lattice‐based ElGamal encryption and signature schemes using SIS problem,” Trans Emerging Tel Tech, vol. 29, no. 6, p. e3255, Jun. 2018, doi: 10.1002/ett.3255.
T. Güneysu, V. Lyubashevsky, and T. Pöppelmann, “Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems,” in Cryptographic Hardware and Embedded Systems – CHES 2012, vol. 7428, E. Prouff and P. Schaumont, Eds., in Lecture Notes in Computer Science, vol. 7428. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 530–547. doi: 10.1007/978-3-642-33027-8_31.
M. Ajtai, “Generating hard instances of lattice problems (extended abstract),” in Proceedings of the twenty-eighth annual ACM symposium on Theory of computing - STOC ’96, Philadelphia, Pennsylvania, United States: ACM Press, 1996, pp. 99–108. doi: 10.1145/237814.237838.
C. Peikert, “A Decade of Lattice Cryptography,” FNT in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2016, doi: 10.1561/0400000074.
P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM Rev., vol. 41, no. 2, pp. 303–332, Jan. 1999, doi: 10.1137/S0036144598347011.
D. Johnson, A. Menezes, and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” IJIS, vol. 1, no. 1, pp. 36–63, Aug. 2001, doi: 10.1007/s102070100002.
P. Rani, U. C. Garjola, and H. Abbas, “A Predictive IoT and Cloud Framework for Smart Healthcare Monitoring Using Integrated Deep Learning Model,” NJF Intelligent Engineering Journal, vol. 1, no. 1, pp. 53–65, Dec. 2024, doi: 10.64179/3080-7549.1004.
W. Yin, Q. Wen, W. Li, H. Zhang, and Z. Jin, “An Anti-Quantum Transaction Authentication Approach in Blockchain,” IEEE Access, vol. 6, pp. 5393–5401, 2018, doi: 10.1109/ACCESS.2017.2788411.
P. Bagchi, B. Bera, A. K. Das, S. Shetty, P. Vijayakumar, and M. Karuppiah, “Post quantum lattice-based secure framework using aggregate signature for ambient intelligence assisted blockchain-based IoT applications,” IEEE Internet of Things Magazine, vol. 6, no. 1, pp. 52–58, 2023.
A. Singh et al., “Blockchain-Based Lightweight Authentication Protocol for Next-Generation Trustworthy Internet of Vehicles Communication,” IEEE Trans. Consumer Electron., vol. 70, no. 2, pp. 4898–4907, May 2024, doi: 10.1109/TCE.2024.3351221.
P. Rani, S. Verma, S. P. Yadav, B. K. Rai, M. S. Naruka, and D. Kumar, “Simulation of the Lightweight Blockchain Technique Based on Privacy and Security for Healthcare Data for the Cloud System:,” International Journal of E-Health and Medical Communications, vol. 13, no. 4, pp. 1–15, Sep. 2022, doi: 10.4018/IJEHMC.309436.
D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, “Bonsai Trees, or How to Delegate a Lattice Basis,” J Cryptol, vol. 25, no. 4, pp. 601–639, Oct. 2012, doi: 10.1007/s00145-011-9105-2.
V. Lyubashevsky, “Lattice Signatures without Trapdoors,” in Advances in Cryptology – EUROCRYPT 2012, vol. 7237, D. Pointcheval and T. Johansson, Eds., in Lecture Notes in Computer Science, vol. 7237. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 738–755. doi: 10.1007/978-3-642-29011-4_43.
L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, “Lattice Signatures and Bimodal Gaussians,” in Advances in Cryptology – CRYPTO 2013, vol. 8042, R. Canetti and J. A. Garay, Eds., in Lecture Notes in Computer Science, vol. 8042. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 40–56. doi: 10.1007/978-3-642-40041-4_3.

