A Pairing-Free Identity-Based Identiﬁcation Scheme with Tight Security Using Modiﬁed-Schnorr Signatures

: The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Difﬁe–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identiﬁcation (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key sizes as compared to existing IBI schemes without increasing the number of operations required for its identiﬁcation protocol. Our scheme is suitable to be used for lightweight authentication in resource-constrained Wireless Sensor Networks (WSNs) as it utilizes the lowest amount of bandwidth when compared to other state-of-the-art symmetric key lightweight authentication schemes. Although it is costlier than its symmetric key counterparts in terms of operational costs due to its asymmetric key nature, it enjoys other beneﬁts such as decentralized authentication and scalable key management. As a proof of concept to substantiate our claims, we perform an implementation of our scheme to demonstrate its speed and memory usage when it runs on both high and low-end devices.


Introduction
Identification or authentication is the act of ensuring the identity of an entity that one is interacting with, is in fact what the entity claims it to be. An identity-based identification (IBI) scheme is an identification scheme with the public key as a publicly identifiable string (i.e., johnsmith@example.com) instead of a random-looking one (i.e., An RSA key). The IBI scheme allows a user to prove the possession of a secret key corresponding to their public identity with a verifier by acquiring corroborative evidence through an interactive protocol [1].
When the public key is publicly identifiable, the scheme enjoys several advantages compared to to its random-looking counterparts. This is due to the fact that the keys are no longer needed to be verified or authenticated, as they represent the entity in plaintext. Besides, the storage and transmission bandwidth requirements are also significantly reduced because identity strings are small in comparison (e.g., well known www.google.com of size 14 bytes versus a 2048-bit RSA key of size 256 bytes). Figure 1 shows the system architecture of an access control system using IBI schemes. Essentially, the key generation center (KGC) acts as the trusted authority which issues user keys corresponding to their public identities. The system then employs authentication servers to verify valid users attempting to access critical resources. Much like the conventional public key infrastructure, the system assumes the existence of a secure trusted

Motivation
As Internet-of-Things (IoT) devices begin to proliferate the digital landscape in the coming years [3], new challenges such as device authentication using minimal resources (i.e., storage, bandwidth requirements) emerged. Identity-based cryptography is proposed as a primitive to tackle such challenges [4,5].
For example, IoT devices (i.e., sensors in a Wireless Sensor Network (WSN)) can use their MAC address as their public key. In the case where the sensors connect to a gateway before they can push data up to the cloud, the gateway would simply check if the connecting device's MAC address has permission based on the access control policy before running the identity-based cryptographic protocol to perform authentication.
In contrast to conventional public key cryptography, a certificate is first required to validate the authenticity of the MAC address before performing authentication. The key difference is that in identity-based cryptography, the authentication will fail when the identity is not authentic or the entity does not have the secret key. In other words, the result of the protocol is mathematically bounded to the identity and its proof of identity (i.e., the secret), which makes it very useful for authentication as it figuratively kills two birds with one stone.
An alternative to address the challenge is to utilize symmetric key cryptography. Recent advances in this field such as an instantiation using only Hash and XOR primitives [6] are very efficient in terms of computation and bandwidth requirements. However, a consistent database of keys and device identities must be maintained and synchronized across the authenticators. It becomes an obstacle in scaling up for Wide Area Network because it is not practical to have a centralized authenticator. In this regard, the properties of identity-based cryptography are desirable as there is no need to consistently update any database even if there are multiple authenticators.
Despite the strengths of identity-based cryptography, the main disadvantage is key revocation. While some may argue that the use of a revocation list or something akin to an Online Certificate Status Protocol (OCSP) service may be put in place to overcome this problem, it brings back the synchronization issues across a vast array of authenticators when dealing with IoT networks. Recent progress in hierarchical identity-based cryptography [7,8] shows that the problem may be alleviated by partitioning the entire network into smaller subnets controlled by a local authority.
Another issue with identity-based cryptography is key escrow. The KGC inherently knows all the user's secrets as it is responsible for generating them, unlike in the conventional public key setting where users could generate their own key-pair and have the public key infrastructure certify their public keys [9].
There are other scenarios in which authentication is not required at the network layer but on the application or other layers. The above scenarios only serve as examples in which identity-based cryptography can pragmatically support the authentication requirements of the expanding networks of IoT devices, which motivates our work in such schemes.

Related Works
Identity-based cryptosystems were first proposed by Shamir [10], followed by various improvements and enhancements as discussed in [11][12][13][14]. The works by Kurosawa and Heng [15], Bellare et al. [16] and Yang et al. [17] added frameworks and transform methods, allowing direct conversion of existentially unforgeable digital signature schemes to an IBI scheme that is secure against passive attackers. Despite the advances, proving security against active and concurrent attackers are proved to be difficult. In 2008, Crescenzo [18] attempted to show security against active and concurrent attackers for the Beth-IBI scheme. Despite the fact, Chin et al. has pointed out that the scheme suffers from a complete break [19], allowing extraction of the master key from only two hash and corrupt queries in 2013.
In 2011, Tan et al. [20] and Chin et al. [21] in IBI focused on tightening security proofs for schemes. The notion of provable security is to link an adversary which is first thought to be able to break the cryptographic scheme to an adversary that could be used to solve an underlying hard assumption (i.e., factoring large numbers, Computational Diffie-Hellman problem) that are thought to be impractical within a reasonable amount of time. The link is a reduction from one problem to another, while a tight reduction means that the probability of breaking the scheme is close to the probability of solving the hard problem.
There are several advantages to having a security scheme with tight security proofs, most notably, being able to securely use smaller size parameters [22]. In such a case, the storage and bandwidth overheads are reduced while the cryptographic scheme is in place. Meanwhile, some transformation frameworks such as the Kurosawa-Heng transform [15] can convert signature schemes into IBI schemes but the resulting proof is not tight. In 2011, Tan et al. [20] showed a tight security proof on an IBI scheme which uses Schnorr signatures. It is achieved by foregoing usage of both the Reset-Lemma [14] and the stronger interactive one-more assumptions [17], resulting in a tighter bound.
In 2012, Fujioka et al. [23] introduced the use of the OR-proof method in proving security against active and concurrent attackers. Prior to their proposal, IBI schemes relied on strong interactive assumptions for their security proof which results in weaker security guarantees. The OR-proof allows direct conversion of passive security to active security without the use of the interactive assumptions and was used by [24,25]. However, the security on active/concurrent secure schemes become reliant on the security of the passive scheme. In other words, the bounds are still loose when compared to a direct reduction to a hard assumption. OR-proofing will also lead to an increase in bandwidth requirements as commit, challenge and response messages are practically doubled.
In 2020, Chia and Chin [26] revisited the use of Boneh-Lynn-Shacham signatures [27] in an IBI scheme. Their proposal runs on Type-3 pairings and has tight security against active and concurrent attackers. Although their proposed scheme enjoys advantages in terms of key sizes and system parameters, it is nevertheless pairing-based and has a longer identification runtime as compared to pairing-free IBI schemes.
Aside from the three common types of attackers (i.e., passive, active and concurrent), there is a stronger fourth type known as the reset attacker. This attacker has the ability to reset a legitimate user up to any state that it desires in the identification protocol, which can easily break IBI schemes that are proven under the Reset Lemma [14]. Chin et al. continued the work of Bellare et al. [28] and Pairat et al. [29] by showing two instances of reset-secure IBI scheme with existing Schnorr-based IBI scheme [30] in 2015. However, as pointed out by Tan et al. [20], reset attacks can be thwarted through proper implementation by forcing erasure of the committed message before the final response is sent.
One of the main issues with previous schemes such as [15][16][17] is mainly the use of the interactive One-More assumptions, which is a strong assumption that ultimately results in weak security. While schemes like [21,26] do not rely on One-More assumptions, they require the Reset Lemma [14] in their security proof which effectively halved the security bound due to the square root. These generally meant keys are to be doubled in length (e.g., 128-bit security √ 2 −k = 2 −k/2 , 2 −128 = 2 −256/2 requires a 256-bit key) to compensate for the looseness in their reduction techniques.

Our Contribution
In this work, we propose an IBI scheme that is based on a new signature scheme known as TNC signatures designed by Tan et al. [31]. We prove that our construction satisfies passive security by showing that the identification protocol is an honest verifier semi zero-knowledge protocol as required by the Kurosawa-Heng transform [15].
We then present a non-trivial proof of security against both active/concurrent attackers under the D-square-DH assumption, which is believed to be as hard as the decisional Diffie-Hellman assumption [32]. We manage to avoid the use of One-More assumptions as well as the Reset Lemma, and the resulting scheme enjoys a lesser number of public key components as well as a tighter bound compared to previous pairing-free schemes. Additionally, we present a C/C++ run-time evaluation of our scheme in the form of a library built using the NaCL library (libsodium) [33].
We finally give an analysis of the effectiveness of our scheme in terms of key sizes and computational savings, and subsequently provide suggestions on use-cases for the newly designed scheme both in the context Internet-of-Things (IoT) security and as a suitable alternative for lightweight authentication schemes.

Preliminaries
In this work, {0, 1} k is a bit-string of length k, while {0, 1} * is a bit-string of arbitrary length. r $ ← − S denotes uniformly sampling an element r from a set S. s ← (a, b) means assigning tuple (a, b) as s while (a, b) ← s means parsing s to a tuple with elements a and b. q by default implies a prime number and k the security parameter. P and V shall represent the prover and the verifier, respectively. Z q and G represent the integers modulo q and a group where the discrete logarithm problem is hard, respectively. IMP-ATK is short for an impersonation attack model where ATK ∈ {passive(PA), active(AA), concurrent(CA)}. Adv I MP−ATK IBI,I is the security of an IBI scheme under IMP-ATK against an impersonator I. Finally, C MT , C H A and R SP are, respectively, the commit, challenge and response messages. We denote A(x 1 , ...x n : o 1 , ...o m ) as algorithm A running with n inputs x 1 , ..., x n and has access to m oracles o 1 , ..., o m .

Identity-Based Identification (IBI)
Definition 1. An IBI scheme consists of four probabilistic polynomial-time algorithms, IBI = (MKGen, UKGen, PROVE, VERIFY). The specification and functionality of the 4 algorithms are described as follows: • MKGen(1 k ): Takes in a security parameter 1 k , outputs a master secret-key (msk) and a corresponding master public-key (mpk). msk is to be securely kept while mpk may be freely distributed to the provers and verifiers. • UKGen(msk, ID): Takes in msk and a publicly verifiable identity string (ID), outputs a user key (uk) corresponding to ID. The uk contains a secret and public part, which are used by users to identify themselves with their public identity ID during the identification protocol. • PROVE(st, mi): This interactive algorithm is run by a prover P with inputs state information (st) and an incoming message string (mi) from a verifier V. It produces updated state infor-mation (st ) for its next invocation and an outgoing message string (mo) to be sent to V. st initially consists of mpk, ID and uk. • VERIFY(st, mi): This interactive algorithm is run by a verifier V with inputs state information (st) and an incoming message string (mi) from a prover P. It produces updated state information (st ) for its next invocation and an outgoing message string (mo) to be sent to P. st initially consists of mpk and ID. At some point, mo is the decision of the interaction that is either accept for legitimate provers and reject otherwise.
We use the notation similarly to Bellare's [16]: to denote an interaction between prover P and verifier V using a Sigma protocol. The interaction between P and V ends when V outputs accept or reject obtained from the VERIFY interactive algorithm. The results of the interaction are a transcript T which can be parsed as a tuple (C MT , C H A , R SP ) ← T and a decision coin d, where d = 1 when V accepts P's claim of identity ID, and 0 otherwise. We say T is an acceptable transcript on ID if d = 1. A sigma protocol may satisfy the honest-verifier semi zero-knowledge as defined under Definition 2.

Definition 2. A Sigma protocol is honest-verifier semi zero-knowledge if it satisfies Completeness, Special Soundness and Honest-Verifier Zero-Knowledge.
Completeness. For any legitimate prover P and honest verifier V, Special Soundness. For any two acceptable transcripts T 1 , T 2 with C MT 1 = C MT 2 and C H A 1 = C H A 2 , the user secret key (usk) can be computed efficiently.
Honest-Verifier Zero-Knowledge. There exists a simulator S with no knowledge of any secrets (i.e., msk, uk) but could generate transcripts with itself such that The last property implicates that the transcript leaks no additional knowledge due to the fact that it could entirely be simulated without a priori on any secrets.

Security Model for IBI
An IBI scheme is considered broken if an adversary (i.e., impersonator) successfully tricks V in accepting the transcript produced from the identification protocol with non-negligible probability. The goal of an attacker is impersonation IMP and there are traditionally 3 types of attacks which are passive(PA), active(AA) and concurrent(CA) attacks. We adopt the security requirements of an IBI scheme based on the works of Bellare et al. [16] as a game between adversary A and challenger C shown in Figure 2, where A wins if the result of the game is 1 and lose otherwise. There are two phases in the game. In the first phase, A gets to accumulate information and prepare for impersonation on an identity string that it desires (ID*). Meanwhile, in the second phase, it has to impersonate ID* successfully. It is obvious that ID* cannot have its user key corrupted by A or the game would be pointless, since A would always win in phase 2, Therefore, C will check for corruption of ID* after phase 1. Intuitively, an IBI scheme that is secure against active/concurrent attacks is also secure against passive attacks as passive attacks are inherently weaker.
Security game between A and C for IMP-ATK, Exp I MP−ATK IBI,I Input: C receives security parameter k.

Game:
where k is the security parameter.

Definition 3.
An IBI is said to be t, q C , Adv I MP−ATK IBI,I (k)-secure against IMP-ATK when the advantage for all polynomial-time I, Adv I MP−ATK IBI,I (.) is negligible. q C is the number of queries made to the corruption oracle.

Complexity Assumptions
Definition 4. The Decisional Square Diffie-Hellman assumption (D-Square-DH). Given (g, g a , g c ), decide if g c ? = g a 2 by returning 1 if yes and 0 otherwise. The advantage of an adversary A running in time t is: )-breaks the assumption if the above probability is non-negligible. The D-Square-DH assumption states that no adversary running under polynomial-time t can break D-Square-DH. The D-Square-DH assumption was studied by Bao et al. [32].

Construction of the Scheme
In this work, we propose a construction of an IBI scheme by using the TNC digital signature scheme by Tan et al. [31,34] (i.e., Tan-Ng-Chin signature).

TNC Digital Signature
The TNC signature scheme is a digital signature scheme that reduces to the D-square-DH assumption with tight security [31,34]. We recap the 3 main algorithms in the TNC signature scheme in the algorithms shown in Figure 3.
return σ ← (s, x) TNC.Verify(pk, m, σ) return 0 A valid signature can always be verified correctly because Equation (3) holds for the right s, x values. Notice that this will fail for all s, x when y 2 = g c = g aa , except for a specific case of x = a(s−r) c which has a negligible probability of occurring at 1/q: We show that TNC digital signature has a Sigma protocol that satisfies honest verifier semi zero-knowledge, which can result in IBI schemes that are secure against IMP-PA attacks via the Kurosawa-Heng transform. Our proposed protocol is shown in Figure 4. Figure 4 is an honest verifier zero-knowledge protocol with the challenges sampled from the finite field of prime order q.

Theorem 1. The identification protocol shown in
Proof. We show that the protocol satisfies Completeness, Special Soundness and Honest-Verifier Zero-Knowledge.
Completeness is proved by showing that a P with valid σ is able to prove itself to V successfully. To see why, Equation (4) Special Soundness is proved with the help of two acceptable conversations between (P, V ): Then the secret part of uk, s can be computed following Equation (5).
Honest-Verifier Zero-Knowledge is proved by showing a simulator S that is capable of simulating a valid conversation (C MT , C H A , R SP ). S first samples e, c, r $ ← − Z q , then sets U = g r , V = y r 1 and computes x = H(ID, U , V ) as well as T = g e /(U · y x 1 ) c . Finally, it outputs an acceptable transcript: ((U , V , T), c, e).

TNC Identity-Based Identification (TNC-IBI)
We now apply the Kurosawa-Heng transform by converting KeyGen and Sign to MKGen and UKGen as shown in Figure 4. The message m is turned into the publicly verifiable string ID. The public key pk is the system parameters mpk or params while sk denotes the master secret key msk. The signature on ID is thus the user key uk, and s is the secret part whilst x is the public part. The protocol shown in Figure 4 is the identification protocol.

Security against Passive Attackers
Lemma 2. The IBI scheme with an honest-verifier zero-knowledge protocol that satisfies completeness, soundness and honest-verifier zero-knowledge implies that it satisfies IMP-PA security based on the Kurosawa-Heng transform [15].

Security against Active and Concurrent Attackers
We stress that the Kurosawa-Heng transform is insufficient to show security against IMP-AA/CA attacks. We show an ad hoc proof satisfying our security model defined under Section 2.2.
where time t is bounded by polynomial and q C is the number of corrupt queries.
Proof. By proof of contradiction, an adversary which breaks D-Square-DH within polynomialtime does not exist. We show that an adversary that breaks the IBI scheme as shown in Section 3.2 could be reduced to one that solves D-square-DH. We construct a simulator S which runs the impersonator I and subsequently show S can use I within the context of an IBI scheme to solve D-square-DH. Thus, any polynomial-time I to our scheme could not exist based on the hardness of the D-square-DH assumption. S first receives the D-square-DH problem (g, g a , g c ) and must output 1 if g c = g a 2 and 0 otherwise. S sets y 1 = g a , y 2 = g c and mpk ← (g, y 1 , y 2 ) with H modeled as a random oracle that takes 3 inputs H : {0, 1} * × G × G → Z q . S also initializes sets LU ← ∅; CU ← ∅; RU ← ∅ for bookkeeping. Note that S does not know the secret a. In phase 1, S runs I with the inputs 1 k , mpk and the oracles as defined by the security game under Figure 2. S then answers oracle queries from I as described in Figure 5.  Once phase 1 is over, I is ready. It will present itself ready to impersonate on ID * where ID * / ∈ CU. S and I play the role as the verifier V and prover P, respectively. Finally, S receives the transcript (U * , V * , T, c, e). S is able to solve the D-square-DH problem because Equation (7) holds when g c = g a 2 . Those who doubt this may refer back to Equation (3) to see why.
Consider the case that the D-square-DH tuple was indeed g c = g a 2 , then S answers all queries correctly with no chance to abort. Although one may argue that S could abort if a hash collision occurs during the corrupt queries, this problem is eliminated as the corrupt query is programmed such that the same ID will always have the same uk. Because we assume I breaks the IBI scheme, the transcript is always valid for the case of y 2 = g c = g a 2 and thus S outputs 1 correctly to the D-square-DH problem. For the case that the D-square-DH tuple is such that g c = g a 2 , the transcript would generally be invalid and S would answer 0 correctly to the D-square-DH problem. There is, however, a negligible probability of 1/q causing Equation (7) to be valid when x = a(s−r) c . This could happen on every invocation to the corrupt query or during verification of transcript in Phase 2, which means there are q C + 1 chances of outputting 1 wrongly to the D-square-DH problem. Therefore, there is a probability of q C +1 q for S to fail at solving D-square-DH. The total probability that S solves D-square-DH successfully is bounded by Equation (8).

On the Strong Unforgeability of the Underlying Signature Scheme
The TNC signature scheme is under a stronger security notion known as strong unforgeability [31]. In the strong unforgeability model, the forger is allowed to use a message m * that was previously queried to the forgery oracle as a challenge but cannot submit a signature previously obtained from a forgery oracle [35]. This security notion guarantees that the signatures are non-malleable and any valid signatures must originate from an honest party. Counter-intuitively, this increased security on the signature scheme does not provably increase the security of this IBI scheme based on the following rationale:

1.
Suppose the impersonator obtains (ID, uk ID ) from a corrupt query on ID. It then manages to perform forgery on ID to obtain (ID, uk ID ) where uk ID = uk ID such that uk ID can be used to produce an acceptable transcript on ID with an honest verifier.

2.
While the impersonator has broken the strong unforgeability of the signature scheme, it cannot be used to break the IBI scheme. This is because once an ID is queried to the corrupt oracle, it can no longer be used as the challenge ID * .
This realization highlights the contextual difference in the importance of malleability in digital signatures and user keys in IBI schemes. Digital signatures can be made public and should therefore be non-malleable while user keys in IBI are kept secret. Even when an attacker gained illegal access to the user keys, there is no motive to alter it to a different key that still works. If the key is valid, it will help the prover (impersonator or not) convince the honest verifier irrespective of how someone got it.

Discussion and Analysis
In this section, we compare our work with existing pairing-free IBI schemes. Note that we do not consider pairing-based IBI schemes in our comparison analysis such as the new IBI scheme from [26] to maintain fairness since pairing operations are more complex and have higher operational costs compared to pairing-free schemes. Our calculations are computed based on the 256-bit security as recommended by NIST [36]. We use 256 bits for integers |Z q | and elliptic curve points and 3072 bits for discrete logarithm group sizes |G|. Table 1 shows the comparison of TNC-IBI (this work) with other existing pairing-free IBI schemes. Comparatively, TNC-IBI has the tightest security when bounded against a hard problem for a limited number of corrupt queries. While Schnorr-IBI [15] may appear to have a tight bound, it is reliant on the security of Schnorr signatures which is a stronger assumption compared to the weaker hard problem assumptions.

Security, Storage and Bandwidth Efficiency
In comparison with the Tight Schnorr-IBI, their bounds can be reduced by q to get the same bounds to that of TNC-IBI if their corrupt queries were programmed such that the same ID will return the same uk to avoid the collision and thus the abort. However, TNC-IBI has the advantage of a smaller mpk size (one G element). In other words, the proposed scheme has a mpk that could be smaller by up to 3072 bits for finite-field arithmetic over integers implementation and 256 bits for finite-field arithmetic over elliptic curves (i.e., Curve25519) implementation.
In the latest work proposed by [21], the Twin-Schnorr IBI scheme is constructed based on a very weak assumption, whereby the bounds of TNC-IBI are shown to be tighter for a small number of hash queries q C . The main advantage of TNC-IBI against Twin-Schnorr is the smaller requirement for user key storage, saving one Z q component. Our scheme can save up to 256 bits (i.e., one Z q element) in uk storage for both finite-field arithmetic over integers Z q and elliptic curve-based implementation.

TNC-IBI (This work)
Adv DSDH q,M Prot. BW-Protocol bandwidth measured per session; Adv ss−cma Schnorr -chosen message attack security of Schnorr signature scheme (see [37]); Adv ss−cma OKCL -chosen message attack security of Okamoto signature scheme (see [38]); Adv DLOG q,M -security of discrete logarithm in prime order group of size q; Adv DDH q,M -security of decisional Diffie-Hellman in prime order group of size q.

With Storage Variant
To further lower TNC-IBI bandwidth, the commit messages can be shortened from (U , V , T) to just T itself. This requires that the verifier maintains a database with tuples (ID, U , V ). Effectively, the total bandwidth size per session is reduced to G + 2Z q , totaling up to 3584 bits on finite-field arithmetic over integers and 768 bits on finitefield arithmetic over elliptic curves implementations. This idea mimics the symmetrical lightweight authentication schemes [6], which maintains a symmetric key database containing the authentication containing the authentication information of the sensors on the verifiers. Table 2 shows the number of operations required to perform identification for the pairing-free IBI schemes. If the precomputation for parts of the commit message C MT is factored in, our proposed scheme has the same or a lesser amount of operations in comparison to Tight-Schnorr and Twin-Schnorr. Particularly, our scheme outperforms Twin-Schnorr by 2 exponentiation and 2 multiplication in G, 1 multiplication and 1 addition in Z q . This is because the values U and V in the protocol under Figure 4 can be precomputed and stored without introducing additional storage overhead to the prover P as the mpk values y 1 and y 2 are no longer needed to be stored. Similar optimizations can also be made for Twin-Schnorr to gain storage efficiency for 1 Z q element. The above improvement only benefits the PROVE algorithm. For optimization on the VERIFY algorithm, we notice that during step 4. of the identification protocol, the right-hand side equation of the final check equation can is independent of the R SP message sent by P in the last pass, and therefore can utilize Out-of-Order execution. VERIFY can first compute the right-hand side while waiting for PROVE to finish computing the R SP , effectively speeding up the final step as it only needs to perform one exponentiation in G and an equality check.

Use-Cases for TNC-IBI
Like other identity-based schemes, TNC-IBI has the advantage of a publicly identifiable public key. Signatures on public keys are not needed. TNC-IBI is particularly suitable for environments where there is difficulty in establishing a trusted public key infrastructure (i.e., disaster-struck regions, memory-constrained environments). Therefore, our proposed scheme is more suitable for networks with scarce bandwidth and computing resources. With the advent of Wireless Sensor Networks (WSNs) along with the rise of the Internet of Things (IoT), various works [39][40][41][42] raised concerns for security challenges in WSNs. We foresee that our proposed scheme will be part of the solution to the problems raised.
For example, the gateway nodes for WSNs can run the verification algorithm against a sensor that pushes data to the cloud. The vendors or manufacturers of the sensor nodes can thus be the respective key generation center for each sensor, using devices with a Physical Unclonable Function (PUF) to store the user key. To ensure only authorized sensor nodes are sending data through the gateway, the sensors may be infrequently requested to run the identification protocol to ensure that communication with the sensor nodes is not hijacked. As TNC-IBI has the shortest key sizes and the least number of operations required during identification, it is, therefore one of the most suitable asymmetric authentication candidates for WSNs as compared to other schemes for asymmetric lightweight authentication.
Most lightweight authentication schemes catered for WSNs are designed based on symmetric key cryptography [6,43,44] (i.e., the gateway and the sensor nodes shares a secret). We argue that even though that asymmetric key cryptography is generally more computationally costly than symmetric cryptography, TNC-IBI is still an attractive alternative due to the following reasons: • Low bandwidth requirements. Referring to Table 3, TNC-IBI has low bandwidth requirements compared to other symmetric-based alternatives mainly due to the use of Curve25519. While TNC-IBI only authenticates the prover as opposed to mutual authentication, it is sufficient for the use-case of WSNs. It is because the cost-benefit trade-off of impersonating as sensor node (i.e., low cost, but gains access to the edge network, pushing malicious data/code to cloud) far outweighs that of impersonating as a gateway (i.e., high cost, gains access to sensor data). • Decentralized authentication. Symmetric schemes require a database that stores the symmetric keys and auxiliary information pertaining to the authentication of sensor nodes. Suppose if a network spans across a vast area, multiple gateways would be required which mimics the structure of a cellular network (i.e., LoRaWAN [45] and Narrowband IoT [46]). In this scenario, symmetric schemes would need to relay authentication messages between gateways to a central authenticator or keep a copy of the database on the gateways. The former option means a high latency during authentication while the latter requires synchronization between the database on the gateways, in which both introduce complexity to the network. TNC-IBI allows for authentication to be decentralized because the gateway would only need to store the master public key without any necessity for updating. • Scalable key management on authenticators. TNC-IBI has constant storage requirements on the authenticator across any number of sensors deployed in the network even if multiple authenticators are required. For the symmetric based schemes, storage requirements increase linearly with the number of sensors added into the network. While schemes like [6] have a "without-storage" mode which trade-offs some storage for computational and bandwidth requirements, a symmetric key database must still be maintained and its size increases linearly with the number of sensors added into the network.
When a sensor node reaches its end-of-life, the revocation of keys becomes a challenge as the gateways would need to share a synchronized blacklist of MAC addresses. We point out that recent works in hierarchical based IBI schemes [7] can effectively partition each gateway into its local jurisdiction. While converting TNC-IBI to such a hierarchical form may be non-trivial, we believe it is possible. We note that TNC-IBI can sacrifice storage requirements for lower bandwidth too as described in Section 4.2. For a WSN with only a single authenticator (i.e., centralized verifier), TNC-IBI has the shortest bandwidth requirements even among state-of-the-art lightweight authentication schemes. Therefore, for environments where bandwidth is scarce relative to computational power, TNC-IBI is the optimal choice.
Wearable devices also present another use-case for lightweight authentication schemes. A survey by Kumar et al. [47] highlighted the lightweight requirements for wearable devices due to the limited resources available. Here, our proposed scheme is compared with some presented candidate schemes in terms of computing and communication overhead. Table 4 shows the comparison between our proposed scheme and some schemes considered for wearable device security. Since these schemes are designed for mutual authentication, TNC-IBI has to execute identification runs for both the wearable device and the gateway (i.e., smartphone of the user). In such a case, our proposed scheme is still a lightweight protocol for authenticating the various wearable devices owned and worn on a user, while keeping out malicious attackers who attempt to gain access to the user's home and office network or even their smartphones.
Our proposed scheme can also be used in another scenario known as Zero Interaction Authentication (ZIA) that is introduced by Corner and Noble [48]. ZIA, which utilizes a device known as the token (i.e., IBM Linux wristwatch) to constantly prove the presence of a person to allow access to a resource in a high-security environment. In this scenario, there is an obvious need for an identification protocol that fits nicely to the lightweight storage and protocol bandwidth requirements constrained by the capabilities of the token. These requirements go neatly along with the features of TNC-IBI.
In 2014, Muñoz and Maña proposed a combination of hardware and software approaches for certification [49] for use in cloud computing security monitoring [50][51][52]. Their proposal allows binding of the hardware certification approaches that are used to certify the bare-metal and the operating system to a software certification approach that is suitable for higher level, dynamic, and highly distributed environments. Instead of using a CA to secure the assert statements during certification, TNC-IBI can be used in-place which eliminates the need for client use-case verification.

Run-Time Evaluation
We performed run-time evaluations on the algorithms MKGen, UKGen, PROVE and VERIFY using finite-field arithmetic over Curve25519, an elliptic curve structure designed by Bernstein et al. [56]. The library libsodium, a fork of NaCl (Also known as Networking and Cryptography library or its fork, libsodium. NaCl is a library designed by Bernstein et al. [33] which consist of their original implementation of Curve25519) is used as it comes with Ristretto, allowing construction of prime-order elliptic curves using a method known as decaf [57]. Table 5 depicts the runtime for the 4 algorithms and their memory usage, which is averaged over 10,000 runs. Memory usage is measured using a popular Linux tool for checking memory leaks known as Valgrind [58]. It is observed that the memory use of all 4 algorithms is below 100 kilobytes on the 64bit Intel machine, and below 40 kilobytes on the ARM CPU machine. The implementation is tested on the Raspberry Pi 3 due to its popularity as both the gateway and node device used by various IoT projects. As mentioned by Petrov et al. [59], there are many examples of usecases of the credit card-sized computer in IoT. Although a runtime of 4.44 milliseconds for the VERIFY algorithm on machine B may seem huge, service providers can always invest in better hardware to run the verification algorithm as there are generally more provers than verifiers. Aside from that, the optimization for verifiers discussed in Section 4.3 is also relevant in allowing even lower runtimes. The Raspberry Pi computer is a very lightweight device, which is more suitable for function as a prover than a verifier.

Future Directions
Due to its suitability as a candidate for lightweight authentication, an extensive analysis of the IBI scheme as a security pattern will reveal better system design principles in the context of security and dependability [60,61].

Conclusions
In this work, an IBI scheme based on a later variant of the Schnorr-signature which is secure against passive, active and concurrent attackers is proposed. In addition to having shorter parameters and key sizes, the proposed IBI scheme has tighter security as compared to the latest pairing-free IBI schemes while maintaining similar runtime efficiency in terms of operation count. The scheme is compared with state-of-the-art lightweight authentication schemes in the context of Wireless Sensor Networks. It has a clear advantage in key management and distribution and low bandwidth requirements with the trade-off of higher operational costs due to its asymmetric cryptography setting. A test implementation shows that the newly designed scheme is lightweight and can be easily run on low-end devices. Therefore, it is a natural choice to be used as an asymmetric authentication mechanism for resource-limited systems.