Towards Lightweight Anonymous Entity Authentication for IoT Applications

Preservation of individual privacy is an important issue in future IoT applications, which calls for lightweight anonymous entity authentication solutions that can be executed efficiently upon a wide range of resource-constrained IoT devices and gadgets.

  • PDF / 503,257 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 3 Downloads / 214 Views

DOWNLOAD

REPORT


Huawei Singapore Research Center, Singapore, Singapore {yang.yanjiang,wei.zhuo}@huawei.com 2 East China Normal University, Shanghai, China [email protected] 3 Santa Clara University, Santa Clara, USA [email protected] 4 University of South Australia, Adelaide, Australia [email protected]

Abstract. Preservation of individual privacy is an important issue in future IoT applications, which calls for lightweight anonymous entity authentication solutions that can be executed efficiently upon a wide range of resource-constrained IoT devices and gadgets. Existing anonymous credential techniques are not well fitted to the setting of IoT, and it is especially so when credential revocation support is considered. In this paper, leveraging on dynamic accumulator we propose a lightweight anonymous entity authentication scheme with outsource-able witness update, solving the main bottleneck of anonymous credentials. We further improve the performance of the scheme with the idea of selfblinding, in such a way that the computation by the prover works entirely in the compact bilinear group of bilinear map. Our performance evaluation shows that the proposed schemes are good for resource-constrained devices. Keywords: Anonymous entity authentication · Lightweight · IoT · Anonymous credential · Group signature · Dynamic accumulator · Credential revocation

1

Introduction

We are entering the era of Internet of Things (IoT), where a wide range of smart devices embedded with electronics, software, sensors, and network connectivity are inter-connected, collecting and exchanging data. Individual privacy is a particularly important issue in IoT, as users’ information can be easily gathered and dossier-ed in an inter-connected environment of a large scale. It is well accepted H. Cai—Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China 200062. c Springer International Publishing Switzerland 2016  J.K. Liu and R. Steinfeld (Eds.): ACISP 2016, Part I, LNCS 9722, pp. 265–280, 2016. DOI: 10.1007/978-3-319-40253-6 16

266

Y. Yang et al.

that anonymous entity authentication whereby IoT devices can be authenticated in an anonymous manner is a fundamental step towards the protection of individual privacy. A particular constraint for anonymous entity authentication techniques in IoT is that many IoT devices are limited in resources such as computation, bandwidth, storage and power supply. This calls for lightweight anonymous entity authentication schemes that can be executed efficiently upon the resourceconstraint IoT devices. Existing anonymous entity authentication techniques have not be well optimized for IoT devices. State-of-the-art Anonymous Entity Authentication. Anonymous credential, e.g., [6,15,17,20], is a major anonymous entity authentication technique. Specifically, an anonymous credential enables its holder (say Alice) to convince a verifying entity (e.g., a service provider) of a certain property (e.g. her qualification to access the provider’s service), while withholding any identifyi