{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:10:38Z","timestamp":1767337838182,"version":"3.41.2"},"reference-count":49,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"vor","delay-in-days":294,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Personal credentials, such as passports and drivers\u2019 licenses, can be implemented electronically using multi-show protocols. In this paper, we introduce an IoT Privacy-Oriented selective disclosure credential system, i.e. based on bilinear pairings and multilinear maps. The proposed system consists of three protocols, which allow users to be in control of their personal credentials. The Credentials Authority (CA) verifies and attests to the users credentials. Once the CA signs these credentials, the users cannot modify any of them. Moreover, the users can mask these credentials in every showing process to protect their identity from being revealed through a collusion between the CA and the verifiers. The proposed system maintains unlinkability between the issuing and showing protocols. Furthermore, it achieves unlinkability in the showing protocol such that the verifier cannot distinguish a user in two different sessions of the showing protocol. The proposed system is novel and practical in terms of introducing a new multi-show credential system that supports selective disclosure (Some credentials can be disclosed and others kept secret during the showing protocol.) The proposed system is the first that utilizes multilinear maps in the identification protocol. Making use of bilinear pairings and multilinear maps are suitable for IoT devices that have limited capabilities in terms of power consumption, key storage, and computing power. The security analysis of the proposed system is discussed using Burrows\u2013Abadi\u2013Needham (BAN) logic.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac013","type":"journal-article","created":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T12:37:07Z","timestamp":1666442227000},"source":"Crossref","is-referenced-by-count":3,"title":["An IoT Privacy-Oriented selective disclosure credential system"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7459-484X","authenticated-orcid":false,"given":"Mohamed","family":"Rasslan","sequence":"first","affiliation":[{"name":"Informatics Department, Electronics Research Institute, Ministry of Higher Education and Scientific Research , Cairo 12622, Egypt"}]},{"given":"Mahmoud M","family":"Nasreldin","sequence":"additional","affiliation":[{"name":"CyberistInsight , Ottawa, ON K1S 1N4, Ottawa, Canada"}]},{"given":"Heba K","family":"Aslan","sequence":"additional","affiliation":[{"name":"Informatics Department, Electronics Research Institute, Ministry of Higher Education and Scientific Research , Cairo 12622, Egypt"},{"name":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University , 12588 Giza, Egypt"}]}],"member":"286","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"2022121515105292200_bib1","doi-asserted-by":"crossref","first-page":"157284","DOI":"10.1109\/ACCESS.2019.2949649","article-title":"An improved authentication protocol using smart cards for the Internet of Things","volume":"7","author":"Shouqi","year":"2019","journal-title":"IEEE Access"},{"key":"2022121515105292200_bib2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/s19051141","article-title":"A survey of Internet of Things (IoT) architecture schemes","volume":"19","author":"El-hajj","year":"2019","journal-title":"Sensors"},{"key":"2022121515105292200_bib3","first-page":"1","article-title":"Lightweight and privacy preserving two-factor authentication scheme for iot devices","volume":"1","author":"Gope","year":"2018","journal-title":"IEEE Internet Things J"},{"key":"2022121515105292200_bib4","first-page":"461","article-title":"New directions in IoT privacy using attribute based authentication","author":"Alpar","year":"2018","journal-title":"Proceedings of the ACM International Conference on Computing Frontiers"},{"key":"2022121515105292200_bib5","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1016\/j.future.2017.03.001","article-title":"Privacy preserving Internet of Things: from privacy techniques to a blueprint architecture and efficient implementation","volume":"6","author":"Jayaraman","year":"2017","journal-title":"Fut Gener Comput Syst"},{"key":"2022121515105292200_bib6","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.1109\/ACCESS.2017.2788464","article-title":"Integration of anonymous credential systems in IoT constrained environments","volume":"6","author":"Sanchez","year":"2018","journal-title":"IEEE Access"},{"key":"2022121515105292200_bib7","first-page":"93","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"Camenisch","year":"2001","journal-title":"Adv Cryptol EUROCRYPT"},{"key":"2022121515105292200_bib8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates","author":"Brands","year":"2000"},{"key":"2022121515105292200_bib9","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume-title":"Proceedings of CRYPTO\u201901, LNCS 2139","author":"Boneh","year":"2001"},{"key":"2022121515105292200_bib10","first-page":"514","article-title":"Short signatures from the Weil airing","volume-title":"Proceedings of ASIACRYPT\u201901, LNCS 2248","author":"Boneh","year":"2001"},{"key":"2022121515105292200_bib11","first-page":"301","article-title":"Variations of Diffie-Hellman problem","volume-title":"Proceedings of the Information and Communications Security, LNCS 2836","author":"Bao","year":"2003"},{"key":"2022121515105292200_bib12","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"2","author":"Diffie","year":"1976","journal-title":"IEEE Trans Inform Theor"},{"key":"2022121515105292200_bib13","first-page":"104","article-title":"The gap problems: a new class of problems for the security of cryptographic primitives","volume-title":"Proceedings of the PKC\u201901, LNCS 1992","author":"Okamoto","year":"2001"},{"key":"2022121515105292200_bib14","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0020-0190(99)00047-2","article-title":"Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring","volume":"70","author":"Biham","year":"1999","journal-title":"Inform Process Lett"},{"volume-title":"Introduction to Identity-Based Encryption, Information Security and Privacy Series","year":"2008","author":"Martin","key":"2022121515105292200_bib15"},{"key":"2022121515105292200_bib16","first-page":"321","article-title":"Dynamic group Diffie-Hellman key exchange under standard assumptions","volume-title":"Proceedings of EUROCRYPT\u201902, LNCS 2332","author":"Bresson","year":"2002"},{"key":"2022121515105292200_bib17","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","article-title":"Applications of multilinear forms to cryptography","volume":"324","author":"Boneh","year":"2003","journal-title":"Top Algebr Noncommut Geom Contemp Math"},{"volume-title":"On Ideal Lattices and the GGH13 Multilinear Map. Cryptography and Security [cs.CR]","year":"2019","author":"Pellet-Mary","key":"2022121515105292200_bib18"},{"key":"2022121515105292200_bib19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-34621-8_12","article-title":"On Kilian\u2019s randomization of multilinear map encodings","volume-title":"Advances in Cryptology ASIACRYPT 2019","author":"Coron","year":"2019"},{"key":"2022121515105292200_bib20","first-page":"1","article-title":"Cryptographic multilinear maps using Pro-P groups","volume":"8","author":"Kahrobaei","year":"2021","journal-title":"Adv Math Commun"},{"key":"2022121515105292200_bib21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1515\/jmc-2015-0047","article-title":"Multiparty non-interactive key exchange and more from isogenies on elliptic curves","volume":"14","author":"Boneh","year":"2020","journal-title":"J Math Cryptol"},{"article-title":"Cryptographic multilinear maps and their applications","year":"2017","author":"Zimmerman","key":"2022121515105292200_bib22"},{"article-title":"Efficient multilinear map from graded encoding scheme","year":"2021","author":"Salimi","key":"2022121515105292200_bib23"},{"key":"2022121515105292200_bib24","first-page":"750","article-title":"Aggregate and verifiably encrypted signatures from multilinear maps without random oracles","volume-title":"Proceedings of The Third International Conference and Workshops on Advances in Information Security and Assurance, LNCS 5576","author":"Rckert","year":"2009"},{"key":"2022121515105292200_bib25","first-page":"426","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1989","journal-title":"Math Phys Eng Sci"},{"volume-title":"Application of BAN-Logic","year":"2001","author":"Wessels","key":"2022121515105292200_bib26"},{"key":"2022121515105292200_bib27","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/22145.22178","article-title":"The knowledge complexity of interactive proof-systems","author":"Goldwasser","year":"1985","journal-title":"Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing"},{"key":"2022121515105292200_bib28","first-page":"186","article-title":"How to prove yourself: practical solutions to identification and signature problems","volume-title":"Proceedings of CRYPTO\u201986, LNCS 263","author":"Fiat","year":"1986"},{"key":"2022121515105292200_bib29","first-page":"123","article-title":"A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory","volume-title":"Proceedings of the EUROCRYPT\u201988, LNCS 330","author":"Guillou","year":"1988"},{"key":"2022121515105292200_bib30","first-page":"239","article-title":"Efficient identification and signatures for smart cards","volume-title":"Proceedings of EUROCRYPT\u201989, LNCS 434","author":"Schnorr","year":"1990"},{"key":"2022121515105292200_bib31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"2022121515105292200_bib32","first-page":"167","article-title":"GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks","volume-title":"Proceedings of CRYPTO\u201902, LNCS 2442","author":"Bellare","year":"2002"},{"key":"2022121515105292200_bib33","first-page":"362","article-title":"A new identification scheme based on the bilinear Diffie-Hellman group","volume-title":"Proceedings of ACISP\u201902, LNCS 2384","author":"Kim","year":"2002"},{"key":"2022121515105292200_bib34","article-title":"A new efficient identification scheme based on strong Diffie-Hellman assumption","volume-title":"Proceedings of ISFST\u201904","author":"Shao","year":"2004"},{"key":"2022121515105292200_bib35","article-title":"Zero-knowledge identification scheme in Gap Diffie-Hellman groups","volume-title":"Proceedings of the Western European Workshop on Research in Cryptology","author":"Hufschmitt","year":"2005"},{"key":"2022121515105292200_bib36","first-page":"397","article-title":"An improved identification scheme","volume":"23","author":"Yao","year":"2004","journal-title":"Comput Sci Appl Logic"},{"author":"PRIME - Privacy and Identity Management for Europe","key":"2022121515105292200_bib37"},{"key":"2022121515105292200_bib38","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","article-title":"Security without identification: transaction systems to make big brother obsolete","volume":"28","author":"Chaum","year":"1985","journal-title":"Commun ACM"},{"key":"2022121515105292200_bib39","first-page":"184","article-title":"Pseudonym systems","volume-title":"Proceedings of SAC 2000, LNCS 1758","author":"Lysyanskaya","year":"2000"},{"author":"Digicash Inc","key":"2022121515105292200_bib40"},{"key":"2022121515105292200_bib41","first-page":"217","article-title":"The ESPRIT project CAFE - high security digital payment systems","volume-title":"Proceedings of ESORICS\u201994, LNCS 875","author":"Boly","year":"1994"},{"author":"Radialpoint SafeCare Inc","key":"2022121515105292200_bib42"},{"author":"Credentica Inc","key":"2022121515105292200_bib43"},{"author":"U-Prove product","key":"2022121515105292200_bib44"},{"key":"2022121515105292200_bib45","first-page":"93","article-title":"Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation","volume-title":"Proceedings of EUROCRYPT\u201901, LNCS 2045","author":"Camenisch","year":"2002"},{"key":"2022121515105292200_bib46","first-page":"644","article-title":"Group signatures","volume-title":"Proceedings of EUROCRYPT\u201991, LNCS 547","author":"Chaum","year":"1991"},{"key":"2022121515105292200_bib47","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-70972-7_1","article-title":"An efficient self-blindable attribute based credential scheme","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Rengers","year":"2017"},{"key":"2022121515105292200_bib48","first-page":"421","article-title":"An efficient multi-show unlinkable attribute based credential scheme for a collaborative E-health environment","volume-title":"Proceedings of the IEEE Third International Conference on Collaboration and Internet Computing (CIC)","author":"Pussewalage","year":"2017"},{"volume-title":"Techniques in allowing multi-show in digital credentials","year":"2019","author":"Fan","key":"2022121515105292200_bib49"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac013\/47918886\/tyac013.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac013\/47918886\/tyac013.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T23:10:06Z","timestamp":1671145806000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac013\/6769854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac013","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac013"}}