Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems

Abstract Automatic dependent surveillance broadcast (ADS-B) system is a multi-parameter surveillance system that can improve important aspects of air traffic. Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injecti...

Full description

Saved in:
Bibliographic Details
Main Author: Qihong Yu
Format: Article
Language:English
Published: Nature Portfolio 2025-07-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-05337-x
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849238517789491200
author Qihong Yu
author_facet Qihong Yu
author_sort Qihong Yu
collection DOAJ
description Abstract Automatic dependent surveillance broadcast (ADS-B) system is a multi-parameter surveillance system that can improve important aspects of air traffic. Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injection, and denial of service. Identity based signature is one of the important technologies in solving this problem. The paper proposes a hierarchical and identity-based signature algorithm which may resist the private key’s continual leakage. This proposed scheme not only has the performance of resisting private key leakage, but also has the performance of hierarchical delegation for the private key. Our scheme is proved to be fully secure under the standard model. The scheme can tolerate a leakage rate of nearly 1/3 for private keys. The proposed construction has three characteristics. Firstly, our scheme achieves full security under standard model, which means that its security is independent of the number of inquiries from the attacker. Secondly, this scheme has a delegation function, which may remarkably reduce the burden on the root private key generation center, making it very suitable for systems with limited computing resources and high real-time requirements. Thirdly, through periodic private key updates, our proposal will resist continual leakage attacks for private key, as long as the leakage between two consecutive key updates does not exceed the given limit.
format Article
id doaj-art-1c01e34184e045a7a88d9ab30ec26997
institution Kabale University
issn 2045-2322
language English
publishDate 2025-07-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj-art-1c01e34184e045a7a88d9ab30ec269972025-08-20T04:01:35ZengNature PortfolioScientific Reports2045-23222025-07-0115111410.1038/s41598-025-05337-xFully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systemsQihong Yu0College of Information Engineering, Suqian UniversityAbstract Automatic dependent surveillance broadcast (ADS-B) system is a multi-parameter surveillance system that can improve important aspects of air traffic. Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injection, and denial of service. Identity based signature is one of the important technologies in solving this problem. The paper proposes a hierarchical and identity-based signature algorithm which may resist the private key’s continual leakage. This proposed scheme not only has the performance of resisting private key leakage, but also has the performance of hierarchical delegation for the private key. Our scheme is proved to be fully secure under the standard model. The scheme can tolerate a leakage rate of nearly 1/3 for private keys. The proposed construction has three characteristics. Firstly, our scheme achieves full security under standard model, which means that its security is independent of the number of inquiries from the attacker. Secondly, this scheme has a delegation function, which may remarkably reduce the burden on the root private key generation center, making it very suitable for systems with limited computing resources and high real-time requirements. Thirdly, through periodic private key updates, our proposal will resist continual leakage attacks for private key, as long as the leakage between two consecutive key updates does not exceed the given limit.https://doi.org/10.1038/s41598-025-05337-xHierarchical delegationLeakage resilienceSide channel attacksComposite order group
spellingShingle Qihong Yu
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
Scientific Reports
Hierarchical delegation
Leakage resilience
Side channel attacks
Composite order group
title Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
title_full Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
title_fullStr Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
title_full_unstemmed Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
title_short Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
title_sort fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
topic Hierarchical delegation
Leakage resilience
Side channel attacks
Composite order group
url https://doi.org/10.1038/s41598-025-05337-x
work_keys_str_mv AT qihongyu fullysecureandhierarchicalidentitybasedsignatureforautomaticdependentsurveillancebroadcastsystems