A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately si...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/13/8/1330 |
_version_ | 1797522005878112256 |
---|---|
author | Jason Chia Ji-Jian Chin Sook-Chin Yip |
author_facet | Jason Chia Ji-Jian Chin Sook-Chin Yip |
author_sort | Jason Chia |
collection | DOAJ |
description | The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identification protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other benefits such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices. |
first_indexed | 2024-03-10T08:20:29Z |
format | Article |
id | doaj.art-6c841015f6df4681bf4f0bc4540e78b5 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-10T08:20:29Z |
publishDate | 2021-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-6c841015f6df4681bf4f0bc4540e78b52023-11-22T09:59:29ZengMDPI AGSymmetry2073-89942021-07-01138133010.3390/sym13081330A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr SignaturesJason Chia0Ji-Jian Chin1Sook-Chin Yip2Faculty of Engineering, Multimedia University, Cyberjaya 63100, MalaysiaFaculty of Computing and Informatics, Multimedia University, Cyberjaya 63100, MalaysiaFaculty of Engineering, Multimedia University, Cyberjaya 63100, MalaysiaThe security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identification protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other benefits such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices.https://www.mdpi.com/2073-8994/13/8/1330access controlidentity-based identificationtight securityprovable security |
spellingShingle | Jason Chia Ji-Jian Chin Sook-Chin Yip A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures Symmetry access control identity-based identification tight security provable security |
title | A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures |
title_full | A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures |
title_fullStr | A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures |
title_full_unstemmed | A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures |
title_short | A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures |
title_sort | pairing free identity based identification scheme with tight security using modified schnorr signatures |
topic | access control identity-based identification tight security provable security |
url | https://www.mdpi.com/2073-8994/13/8/1330 |
work_keys_str_mv | AT jasonchia apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures AT jijianchin apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures AT sookchinyip apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures AT jasonchia pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures AT jijianchin pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures AT sookchinyip pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures |