{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:23:28Z","timestamp":1762953808524,"version":"build-2065373602"},"reference-count":61,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Higher Education of Malaysia","award":["FRGS\/1\/2019\/ICT04\/MMU\/02\/5"],"award-info":[{"award-number":["FRGS\/1\/2019\/ICT04\/MMU\/02\/5"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie\u2013Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identification protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other benefits such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices.<\/jats:p>","DOI":"10.3390\/sym13081330","type":"journal-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T10:31:44Z","timestamp":1627036304000},"page":"1330","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures"],"prefix":"10.3390","volume":"13","author":[{"given":"Jason","family":"Chia","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Multimedia University, Cyberjaya 63100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9809-6976","authenticated-orcid":false,"given":"Ji-Jian","family":"Chin","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, Multimedia University, Cyberjaya 63100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8575-4244","authenticated-orcid":false,"given":"Sook-Chin","family":"Yip","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Multimedia University, Cyberjaya 63100, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"ref_1","unstructured":"Menezes, A., Oorschot, P.C.V., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press. [5th ed.]."},{"key":"ref_2","unstructured":"Canetti, R. (2021, February 21). Universally Composable Signatures, Certification and Authentication. Cryptology ePrint Archive, Report 2003\/239. Available online: https:\/\/eprint.iacr.org\/2003\/239."},{"key":"ref_3","unstructured":"Cisco (2014). The Internet of Things Reference Model, Cisco. Technical Report."},{"key":"ref_4","unstructured":"Emura, K., Takayasu, A., and Watanabe, Y. (2021, February 21). Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE. Cryptology ePrint Archive, Report 2020\/1087. Available online: https:\/\/eprint.iacr.org\/2020\/1087."},{"key":"ref_5","unstructured":"Andersen, M.P., Kumar, S., AbdelBaky, M., Fierro, G., Kolb, J., Kim, H.S., Culler, D.E., and Popa, R.A. (2019, January 14\u201316). WAVE: A Decentralized Authorization Framework with Transitive Delegation. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Braeken, A. (2020). Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. Sensors, 20.","DOI":"10.3390\/s20082160"},{"key":"ref_7","first-page":"93","article-title":"A Hierarchical Identity-Based Identification Scheme Without Pairing","volume":"13","author":"Vangujar","year":"2019","journal-title":"Malays. J. Math. Sci."},{"key":"ref_8","unstructured":"Langrehr, R., and Pan, J. (2021, March 03). Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security. Cryptology ePrint Archive, Report 2020\/146. Available online: https:\/\/eprint.iacr.org\/2020\/146."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bai, Q.H. (2012, January 23\u201327). Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE). Proceedings of the CSQRWC 2012, New Taipei, Taiwan.","DOI":"10.1109\/CSQRWC.2012.6294997"},{"key":"ref_10","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based Cryptosystems and Signature Schemes. Proceedings of the CRYPTO 84 on Advances in Cryptology, Santa Barbara, CA, USA."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Odlyzko, A.M. (1987). How To Prove Yourself: Practical Solutions to Identification and Signature Problems. Advances in Cryptology\u2014CRYPTO\u201986, Springer.","DOI":"10.1007\/3-540-47721-7"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Beth, T. (1988). Efficient Zero-Knowledge Identification Scheme for Smart Cards. Advances in Cryptology\u2014EUROCRYPT\u201988, Springer.","DOI":"10.1007\/3-540-45961-8_7"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B. (1991). An identity-based identification scheme based on discrete logarithms modulo a composite number. Advances in Cryptology\u2014EUROCRYPT\u201990, Springer.","DOI":"10.1007\/3-540-46877-3"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yung, M. (2002). GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. Advances in Cryptology\u2014CRYPTO\u20192002, Springer.","DOI":"10.1007\/3-540-45708-9"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bao, F., Deng, R., and Zhou, J. (2004). From Digital Signature to ID-based Identification\/Signature. Public Key Cryptography\u2014PKC 2004, Springer.","DOI":"10.1007\/b95631"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Cachin, C., and Camenisch, J.L. (2004). Security Proofs for Identity-Based Identification and Signature Schemes. Advances in Cryptology\u2014EUROCRYPT\u20192004, Springer.","DOI":"10.1007\/b97182"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.tcs.2008.07.001","article-title":"A new framework for the design and analysis of identity-based identification schemes","volume":"407","author":"Yang","year":"2008","journal-title":"Theor. Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Crescenzo, G.D. (2008). On the Security of Beth\u2019s Identification Schemes against Active and Concurrent Adversaries. Mathematical Methods in Computer Science, Springer. MMICS 2008; Lecture Notes in Computer Science, vol 5393.","DOI":"10.1007\/978-3-540-89994-5_1"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.ipl.2013.04.015","article-title":"On the security of a modified Beth identity-based identification scheme","volume":"113","author":"Chin","year":"2013","journal-title":"Inf. Process. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kim, T.H., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K.I., and Arnett, K.P. (2011). A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction. Future Generation Information Technology, Springer.","DOI":"10.1007\/978-3-642-27142-7"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"237514","DOI":"10.1155\/2015\/237514","article-title":"Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme","volume":"2015","author":"Chin","year":"2015","journal-title":"Thescientificworldjournal"},{"key":"ref_22","unstructured":"Sarkar, P., and Iwata, T. (2013). On Tight Security Proofs for Schnorr Signatures. Advances in Cryptology\u2013ASIACRYPT 2014, Springer. Lecture Notes in Computer Science, vol 8873."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Saito, T., and Xagawa, K. (2012, January 26\u201329). Security Enhancements by OR-Proof in Identity-Based Identification. Proceedings of the Applied Cryptography and Network Security\u201410th International Conference, ACNS 2012, Singapore.","DOI":"10.1007\/978-3-642-31284-7_9"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.tcs.2013.09.008","article-title":"Identity based identification from algebraic coding theory","volume":"520","author":"Yang","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_25","first-page":"227","article-title":"Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR","volume":"Volume 9977","author":"Lam","year":"2016","journal-title":"Proceedings of the Information and Communications Security\u201418th International Conference, ICICS 2016"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chia, J., and Chin, J. (2020). An Identity Based-Identification Scheme with Tight Security against Active and Concurrent Adversaries. IEEE Access.","DOI":"10.1109\/ACCESS.2020.2983750"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","article-title":"Short Signatures from the Weil Pairing","volume":"17","author":"Boneh","year":"2004","journal-title":"J. Cryptol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B. (2001). Identification Protocols Secure against Reset Attacks. Advances in Cryptology\u2014EUROCRYPT\u20192001, Springer.","DOI":"10.1007\/3-540-44987-6"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Youm, H.Y., and Yung, M. (2009). Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. Information Security Applications, Springer.","DOI":"10.1007\/978-3-642-10838-9"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Au, M.H., and Miyaji, A. (2015). Reset-Secure Identity-Based Identification Schemes Without Pairings. Provable Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-26059-4"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ng, T., Tan, S., and Chin, J. (2017, January 18\u201320). A variant of Schnorr signature scheme with tight security reduction. Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2017.8191014"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Qing, S., Gollmann, D., and Zhou, J. (2003). Variations of Diffie-Hellman Problem. Information and Communications Security, Springer.","DOI":"10.1007\/b13930"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hevia, A., and Neven, G. (2012). The Security Impact of a New Cryptographic Library. Progress in Cryptology\u2013LATINCRYPT\u20192012, Springer.","DOI":"10.1007\/978-3-642-33481-8"},{"key":"ref_34","unstructured":"(2017). Malaysian Digital Signature Algorithm Proposal: TNC Signature Scheme, Cybersecurity Malaysia. MySEAL AKBA, National Trusted Cryptographic Algorithm List."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Yung, M., Dodis, Y., Kiayias, A., and Malkin, T. (2006). Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography-PKC 2006, Springer.","DOI":"10.1007\/11745853"},{"key":"ref_36","unstructured":"Elaine, B. (2016). Recommendation for Key Management, Part 1: General."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr","year":"1990","journal-title":"J. Cryptol."},{"key":"ref_38","first-page":"31","article-title":"Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes","volume":"Volume 740","author":"Okamoto","year":"1992","journal-title":"Advances in Cryptology\u2014CRYPTO\u201992, Proceedings of the 12th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16\u201320 August 1992"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sharma, S. (2013, January 21\u201323). Issues and Challenges in Wireless Sensor Networks. Proceedings of the 2013 International Conference on Machine Intelligence and Research Advancement (ICMIRA), Katra, India.","DOI":"10.1109\/ICMIRA.2013.18"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.1109\/ACCESS.2017.2666200","article-title":"A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements","volume":"5","author":"Kobo","year":"2017","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"20558","DOI":"10.1109\/ACCESS.2018.2821445","article-title":"Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks","volume":"6","author":"Boubiche","year":"2018","journal-title":"IEEE Access"},{"key":"ref_42","unstructured":"Ficco, M., and Palmieri, F. (2018). Chapter 4\u2014IoT and Sensor Networks Security. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Academic Press. Intelligent Data-Centric Systems."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Lara, E., Aguilar, L., Sanchez, M.A., and Garc\u00eda, J.A. (2020). Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things. Sensors, 20.","DOI":"10.3390\/s20020501"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Chen, C.M., Xiang, B., Wu, T.Y., and Wang, F. (2018). An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks. Appl. Sci., 8.","DOI":"10.3390\/app8071074"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Basford, P.J., Bulot, F.M.J., Apetroaie-Cristea, M., Cox, S.J., and Ossont, S.J. (2020). LoRaWAN for Smart City IoT Deployments: A Long Term Evaluation. Sensors, 20.","DOI":"10.3390\/s20030648"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Nair, K.K., Abu-Mahfouz, A.M., and Lefophane, S. (2019, January 6\u20138). Analysis of the Narrow Band Internet of Things (NB-IoT) Technology. Proceedings of the 2019 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa.","DOI":"10.1109\/ICTAS.2019.8703630"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.compeleceng.2017.03.008","article-title":"Lightweight authentication protocols for wearable devices","volume":"63","author":"Das","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Corner, M., and Noble, B. (2005). Protecting File Systems with Transient Authentication. Wirel. Netw., 11.","DOI":"10.1007\/s11276-004-4743-z"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Munoz, A., and Mana, A. (2014, January 28\u201330). Software and hardware certification techniques in a combined certification model. Proceedings of the 2014 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria.","DOI":"10.5220\/0005098204050410"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz, A., Ma\u00f1a, A., and Gonz\u00e1lez, J. (2013). Dynamic Security Properties Monitoring Architecture for Cloud Computing. Secur. Eng. Cloud Comput., 1\u201318.","DOI":"10.4018\/978-1-4666-2125-1.ch001"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1093\/comjnl\/bxs042","article-title":"A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications","volume":"55","author":"Gonzalez","year":"2012","journal-title":"Comput. J."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Waller, A., Sandy, I., Power, E., Aivaloglou, E., Skianis, C., Mu\u00f1oz, A., and Ma\u00f1a, A. (2011). Policy Based Management for Security in Cloud Computing. FTRA International Conference on Secure and Trust Computing, Data Management, and Application, Springer. STA Workshops.","DOI":"10.1007\/978-3-642-22365-5_16"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1784","DOI":"10.1109\/TCE.2008.4711235","article-title":"A New Design of Wearable Token System for Mobile Device Security","volume":"54","author":"Sun","year":"2008","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.jnca.2015.10.001","article-title":"A novel asymmetric three-party based authentication scheme in wearable devices environment","volume":"60","author":"Liu","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s00779-016-0926-8","article-title":"The Yoking-Proof-Based Authentication Protocol for Cloud-Assisted Wearable Devices","volume":"20","author":"Liu","year":"2016","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yung, M., Dodis, Y., Kiayias, A., and Malkin, T. (2006). Curve25519: New Diffie-Hellman Speed Records. Public Key Cryptography\u2014PKC\u20192006, Springer.","DOI":"10.1007\/11745853"},{"key":"ref_57","unstructured":"Hamburg, M. (2021, April 12). Decaf: Eliminating Cofactors through Point Compression. Cryptology ePrint Archive, Report 2015\/673. Available online: https:\/\/eprint.iacr.org\/2015\/673."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Nethercote, N., and Seward, J. (2007, January 13\u201315). How to Shadow Every Byte of Memory Used by a Program. Proceedings of the 3rd International Conference on Virtual Execution Environments, San Diego, CA, USA.","DOI":"10.1145\/1254810.1254820"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Petrov, N., Dobrilovic, D., Kavali\u0107, M., and Stanisavljev, S. (2016, January 23\u201325). Examples of Raspberry Pi usage in Internet of Things. Proceedings of the International Conference on Applied Internet and Information Technologies, Fuzhou, China.","DOI":"10.20544\/AIIT2016.15"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Kokolakis, S., G\u00f3mez, A.M., and Spanoudakis, G. (2009). Representation of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence, Springer.","DOI":"10.1007\/978-0-387-88775-3"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Serrano, D., Ruiz, J., Mu\u00f1oz, A., Ma\u00f1a, A., Armenteros, A., and Gallego-Nicasio, B. (2009, January 18\u201323). Development of Applications Based on Security Patterns. Proceedings of the 2009 Second International Conference on Dependability, Athens, Greece.","DOI":"10.1109\/DEPEND.2009.23"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/8\/1330\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:33:51Z","timestamp":1760164431000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/8\/1330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":61,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["sym13081330"],"URL":"https:\/\/doi.org\/10.3390\/sym13081330","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2021,7,23]]}}}