{"id":"https://openalex.org/W4389002837","doi":"https://doi.org/10.1007/s10207-023-00779-8","title":"Enhancing security in Fiat\u2013Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication","display_name":"Enhancing security in Fiat\u2013Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication","publication_year":2023,"publication_date":"2023-11-25","ids":{"openalex":"https://openalex.org/W4389002837","doi":"https://doi.org/10.1007/s10207-023-00779-8"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00779-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00779-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00779-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00779-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093337775","display_name":"Firas Hamila","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Firas Hamila","raw_affiliation_strings":["Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043815989","display_name":"Mohammad Hamad","orcid":"https://orcid.org/0000-0002-9049-7254"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mohammad Hamad","raw_affiliation_strings":["Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093337776","display_name":"Daniel Costa Salgado","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Costa Salgado","raw_affiliation_strings":["Exxeta AG, Mannheim, Germany"],"affiliations":[{"raw_affiliation_string":"Exxeta AG, Mannheim, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080174920","display_name":"Sebastian Steinhorst","orcid":"https://orcid.org/0000-0002-4096-2584"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Steinhorst","raw_affiliation_strings":["Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093337775"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":1.4122,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83103869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"23","issue":"2","first_page":"1131","last_page":"1148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7621333599090576},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.681593656539917},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.5948859453201294},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5529923439025879},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5251581072807312},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.4324432611465454},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41507968306541443},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4093531370162964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37810876965522766},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36743074655532837},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35379528999328613},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08706921339035034},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07975783944129944}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7621333599090576},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.681593656539917},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.5948859453201294},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5529923439025879},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5251581072807312},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.4324432611465454},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41507968306541443},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4093531370162964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37810876965522766},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36743074655532837},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35379528999328613},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08706921339035034},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07975783944129944}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-023-00779-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00779-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00779-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1763461","is_oa":true,"landing_page_url":"https://mediatum.ub.tum.de/1763461","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00779-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00779-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00779-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323383","display_name":"Technische Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/02kkvpp62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389002837.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W62648631","https://openalex.org/W159162986","https://openalex.org/W296058135","https://openalex.org/W627891592","https://openalex.org/W1529012707","https://openalex.org/W1589034595","https://openalex.org/W1910751411","https://openalex.org/W1975245149","https://openalex.org/W2002789557","https://openalex.org/W2023740004","https://openalex.org/W2029693536","https://openalex.org/W2036378739","https://openalex.org/W2095852231","https://openalex.org/W2100705134","https://openalex.org/W2101645518","https://openalex.org/W2120154759","https://openalex.org/W2132303913","https://openalex.org/W2151608175","https://openalex.org/W2155069045","https://openalex.org/W2159617506","https://openalex.org/W2166403741","https://openalex.org/W2255948324","https://openalex.org/W2295806187","https://openalex.org/W2752822516","https://openalex.org/W2753280246","https://openalex.org/W2795247010","https://openalex.org/W2807180547","https://openalex.org/W2888119556","https://openalex.org/W2919099218","https://openalex.org/W2937088631","https://openalex.org/W2952604022","https://openalex.org/W2977812570","https://openalex.org/W3196662786","https://openalex.org/W3214439495","https://openalex.org/W4231286867","https://openalex.org/W4249267162","https://openalex.org/W4322500360"],"related_works":["https://openalex.org/W2466303427","https://openalex.org/W2035793348","https://openalex.org/W1516766811","https://openalex.org/W2157568248","https://openalex.org/W2969705217","https://openalex.org/W2809883875","https://openalex.org/W2362245488","https://openalex.org/W2384324714","https://openalex.org/W2997604978","https://openalex.org/W2949331520"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,114,129,140,143,189,207,210,220,233,258],"rapid":[3],"expansion":[4],"of":[5,76,95,116,142,201,209,222,242],"IoT":[6],"devices":[7],"and":[8,18,37,54,86,101,199,253,267,276],"their":[9,84,89],"applications,":[10],"there":[11,134],"is":[12,135],"an":[13,48,160,172],"increasing":[14],"demand":[15],"for":[16,51,83,105,174,305],"efficient":[17,55],"secure":[19,53,151],"authentication":[20,28,56,165,211,239],"mechanisms":[21,29],"to":[22,39,112,293],"protect":[23],"against":[24,269],"unauthorized":[25],"access.":[26],"Traditional":[27],"face":[30],"limitations":[31],"regarding":[32,139],"computational":[33,290],"speed,":[34],"communication":[35,103,196],"costs,":[36],"vulnerability":[38],"cyber-attacks.":[40],"Zero-knowledge":[41],"proof":[42],"(ZKP)":[43],"protocols":[44],"have":[45,80,110],"emerged":[46],"as":[47,145],"effective":[49],"solution":[50],"achieving":[52],"in":[57,194,213,230,289],"such":[58],"environments":[59],"without":[60],"revealing":[61],"sensitive":[62],"information.":[63],"Among":[64],"ZKP":[65,78],"protocols,":[66,79],"$$\\Sigma":[67,117,152,176,223,295],"$$":[68,118,153,177,224,296],"<mml:math":[69,119,154,178,225,297],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[70,120,155,179,226,298],"<mml:mi>\u03a3</mml:mi>":[71,121,156,180,227,299],"</mml:math>":[72,122,157,181,228,300],"-protocols,":[73,301],"a":[74,126,137,150,184,214,285],"class":[75],"interactive":[77,90],"been":[81],"employed":[82],"efficiency":[85,100,304],"security.":[87],"However,":[88,133],"nature":[91],"necessitates":[92],"multiple":[93],"rounds":[94],"communication,":[96],"which":[97],"can":[98,147],"reduce":[99],"increase":[102],"overhead":[104,197],"resource-constrained":[106],"devices.":[107],"Many":[108],"works":[109],"aimed":[111],"eliminate":[113],"interaction":[115],"-protocols":[123,182,229],"by":[124,236],"utilizing":[125],"transformation":[127,131],"called":[128],"Fiat\u2013Shamir":[130],"(FST).":[132],"still":[136],"concern":[138],"soundness":[141,221],"FST":[144,235],"it":[146],"sometimes":[148],"convert":[149],"-protocol":[158],"into":[159,183],"insecure":[161],"non-interactive":[162],"zero-knowledge":[163,265],"(NIZK)":[164],"scheme.":[166],"In":[167],"this":[168],"paper,":[169],"we":[170,249],"propose":[171],"approach":[173],"transforming":[175],"NIZK":[185],"protocol":[186,205,261],"based":[187],"on":[188],"FST,":[190],"yielding":[191],"significant":[192],"enhancements":[193],"efficiency,":[195],"reduction,":[198],"elimination":[200],"interaction.":[202],"Our":[203,260],"proposed":[204],"enables":[206],"completion":[208],"process":[212],"single":[215],"request":[216],"while":[217],"also":[218],"strengthening":[219],"comparison":[231],"with":[232],"traditional":[234,294],"requiring":[237],"two":[238],"factors":[240],"instead":[241],"one.":[243],"To":[244],"demonstrate":[245],"our":[246,281],"approach\u2019s":[247],"robustness,":[248],"conducted":[250],"comprehensive":[251],"informal":[252],"formal":[254],"security":[255],"analyses":[256],"(using":[257],"Tamarin-Prover).":[259],"demonstrated":[262],"completeness,":[263],"soundness,":[264],"properties,":[266],"robustness":[268],"attacks,":[270],"including":[271],"eavesdropping,":[272],"message":[273],"modification,":[274],"replay,":[275],"brute":[277],"force":[278],"attacks.":[279],"Additionally,":[280],"performance":[282],"analysis":[283],"displayed":[284],"remarkable":[286],"50%":[287],"improvement":[288],"cost":[291],"compared":[292],"underscoring":[302],"its":[303],"practical":[306],"use.":[307]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
