Next Article in Journal
Key Generation for Hardware Obfuscation Using Strong PUFs
Previous Article in Journal
Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction

I2PA: An Efficient ABC for IoT

Laboratoire de Traitement de l’Information et des Systèmes Intelligents, Ecole Polytechnique de Thiès, P.O. Box A10 Thiès, Senegal
Ecole Doctorale Développement Durable et Société, Université de Thiès, P.O. Box 967 Thiès, Senegal
Author to whom correspondence should be addressed.
Cryptography 2019, 3(2), 16;
Received: 9 May 2019 / Revised: 10 June 2019 / Accepted: 18 June 2019 / Published: 21 June 2019
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously takes into account these aspects. In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof. Our scheme supports block signing, selective disclosure, and randomization. It provides data minimization and transaction unlinkability. Our construction is efficient since smaller key size can be used, and computing time can be reduced. As a result, it is a suitable solution for IoT devices characterized by three major constraints, namely low-energy power, small storage capacity, and low computing power. View Full-Text
Keywords: IoT; credential; privacy; anonymity; ECC; ZKP; blind signing; selective disclosure; randomization IoT; credential; privacy; anonymity; ECC; ZKP; blind signing; selective disclosure; randomization
Show Figures

Figure 1

MDPI and ACS Style

Sene, I.; Ciss, A.A.; Niang, O. I2PA: An Efficient ABC for IoT. Cryptography 2019, 3, 16.

AMA Style

Sene I, Ciss AA, Niang O. I2PA: An Efficient ABC for IoT. Cryptography. 2019; 3(2):16.

Chicago/Turabian Style

Sene, Ibou, Abdoul A. Ciss, and Oumar Niang. 2019. "I2PA: An Efficient ABC for IoT" Cryptography 3, no. 2: 16.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop