Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to protect against unauthorized access. Traditional authentication mechanisms face limitations regarding computational speed, communication costs, and vulnerability to cyber-attacks. Zero-knowledge proof (ZKP) protocols have emerged as an effective solution for achieving secure and efficient authentication in such environments without revealing sensitive information. Among ZKP protocols, Σ-protocols, a class of interactive ZKP protocols, have been employed for their efficiency and security. However, their interactive nature necessitates multiple rounds of communication, which can reduce efficiency and increase communication overhead for resource-constrained devices. Many works have aimed to eliminate the interaction of Σ-protocols by utilizing a transformation called the Fiat–Shamir transformation (FST). However, there is still a concern regarding the soundness of the FST as it can sometimes convert a secure Σ-protocol into an insecure non-interactive zero-knowledge (NIZK) authentication scheme. In this paper, we propose an approach for transforming Σ-protocols into a NIZK protocol based on the FST, yielding significant enhancements in efficiency, communication overhead reduction, and elimination of interaction. Our proposed protocol enables the completion of the authentication process in a single request while also strengthening the soundness of Σ-protocols in comparison with the traditional FST by requiring two authentication factors instead of one. To demonstrate our approach’s robustness, we conducted comprehensive informal and formal security analyses (using the Tamarin-Prover). Our protocol demonstrated completeness, soundness, zero-knowledge properties, and robustness against attacks, including eavesdropping, message modification, replay, and brute force attacks. Additionally, our performance analysis displayed a remarkable 50% improvement in computational cost compared to traditional Σ-protocols, underscoring its efficiency for practical use.

Original languageEnglish
Pages (from-to)1131-1148
Number of pages18
JournalInternational Journal of Information Security
Volume23
Issue number2
DOIs
StatePublished - Apr 2024

Keywords

  • Authentication
  • Fiat–Shamir transformation
  • IoT
  • Non-interactive zero-knowledge proof
  • Σ-Protocols

Fingerprint

Dive into the research topics of 'Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication'. Together they form a unique fingerprint.

Cite this