A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures

The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately si...

Full description

Bibliographic Details
Main Authors: Jason Chia, Ji-Jian Chin, Sook-Chin Yip
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/13/8/1330
_version_ 1797522005878112256
author Jason Chia
Ji-Jian Chin
Sook-Chin Yip
author_facet Jason Chia
Ji-Jian Chin
Sook-Chin Yip
author_sort Jason Chia
collection DOAJ
description The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identification protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other benefits such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices.
first_indexed 2024-03-10T08:20:29Z
format Article
id doaj.art-6c841015f6df4681bf4f0bc4540e78b5
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-10T08:20:29Z
publishDate 2021-07-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-6c841015f6df4681bf4f0bc4540e78b52023-11-22T09:59:29ZengMDPI AGSymmetry2073-89942021-07-01138133010.3390/sym13081330A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr SignaturesJason Chia0Ji-Jian Chin1Sook-Chin Yip2Faculty of Engineering, Multimedia University, Cyberjaya 63100, MalaysiaFaculty of Computing and Informatics, Multimedia University, Cyberjaya 63100, MalaysiaFaculty of Engineering, Multimedia University, Cyberjaya 63100, MalaysiaThe security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identification protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other benefits such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices.https://www.mdpi.com/2073-8994/13/8/1330access controlidentity-based identificationtight securityprovable security
spellingShingle Jason Chia
Ji-Jian Chin
Sook-Chin Yip
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
Symmetry
access control
identity-based identification
tight security
provable security
title A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
title_full A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
title_fullStr A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
title_full_unstemmed A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
title_short A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
title_sort pairing free identity based identification scheme with tight security using modified schnorr signatures
topic access control
identity-based identification
tight security
provable security
url https://www.mdpi.com/2073-8994/13/8/1330
work_keys_str_mv AT jasonchia apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures
AT jijianchin apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures
AT sookchinyip apairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures
AT jasonchia pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures
AT jijianchin pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures
AT sookchinyip pairingfreeidentitybasedidentificationschemewithtightsecurityusingmodifiedschnorrsignatures