Abstract

The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously takes into account these aspects. In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof. Our scheme supports block signing, selective disclosure, and randomization. It provides data minimization and transaction unlinkability. Our construction is efficient since smaller key size can be used, and computing time can be reduced. As a result, it is a suitable solution for IoT devices characterized by three major constraints, namely low-energy power, small storage capacity, and low computing power.

Highlights

  • The Internet has changed our way of living

  • The concept of the Internet of Things (IoT) has emerged, and envisages the integration of all real-world objects into the Internet

  • In many applications involving anonymity, it is often desirable to allow a participant to sign a document without knowing its content; this is known as blind signature

Read more

Summary

Introduction

The Internet has changed our way of living. it has become an integral part of our life. Authentication is based on identification, which makes activities of an entity traceable since each device is directly or indirectly associated with its owner. PKIs’ main objective is to guarantee key encryption authenticity. They cannot protect users’ privacy and users cannot get a credential on a subset of their attributes without letting the certification authority (CA) see the resulting credential. When authenticating to a service provider, users must show their whole credentials instead of just proving their eligibility for that access. Credentials systems known as Attribute-Based Credentials (ABCs). Authentication is carried out by revealing the bare minimum necessary Better, it is possible, for a set of attributes, to prove their possession instead of revealing their values, from where derives the concept I2PA, meaning “I Prove Possession of Attributes”.

Related Works
Mathematic Background
Definition
Edwards’ Curves
Attribute
Credential
Zero-Knowledge Proofs
Blind Signing
Blindness
Architecture
Set-Up
Issuance
Signature on a Single Message
Verification
Randomized Version
Selective Disclosure
Complexity Analysis
Operations over the Curve Comparison
Memory Usage Comparison
Feature Comparison
Go of SDRAM LPDDR2
Software Set-up
Curve and Parameters
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.