Abstract
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously takes into account these aspects. In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof. Our scheme supports block signing, selective disclosure, and randomization. It provides data minimization and transaction unlinkability. Our construction is efficient since smaller key size can be used, and computing time can be reduced. As a result, it is a suitable solution for IoT devices characterized by three major constraints, namely low-energy power, small storage capacity, and low computing power.
Highlights
The Internet has changed our way of living
The concept of the Internet of Things (IoT) has emerged, and envisages the integration of all real-world objects into the Internet
In many applications involving anonymity, it is often desirable to allow a participant to sign a document without knowing its content; this is known as blind signature
Summary
The Internet has changed our way of living. it has become an integral part of our life. Authentication is based on identification, which makes activities of an entity traceable since each device is directly or indirectly associated with its owner. PKIs’ main objective is to guarantee key encryption authenticity. They cannot protect users’ privacy and users cannot get a credential on a subset of their attributes without letting the certification authority (CA) see the resulting credential. When authenticating to a service provider, users must show their whole credentials instead of just proving their eligibility for that access. Credentials systems known as Attribute-Based Credentials (ABCs). Authentication is carried out by revealing the bare minimum necessary Better, it is possible, for a set of attributes, to prove their possession instead of revealing their values, from where derives the concept I2PA, meaning “I Prove Possession of Attributes”.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.