Optimized Ambiguous-Key ECC Signatures for Lightweight and Secure IoT Systems
Keywords:
Digital signatures, elliptic curves, Hidden Shift Problem, discrete logarithm problem
Abstract
In IoT constrained environments, traditional digital signatures struggle to acheive an effective balancebetween security, compactness, and computational efficiency. To overcome these constraints, we propose alightweight elliptic-curve signature scheme based on a dual-component private key (x, Q1) and two auxiliarycommitments, inspired by the Schnorr structure. The design introduces structural ambiguity in the secretkey, increasing resistance to key-recovery attacks while maintaining a lightweight and fast signature process.Experimental evaluation on NIST-standardized elliptic curves shows competitive performance: key generationranges from 11.6 ms to 232.1 ms, signing from 17.9 ms to 245.4 ms, and verification from 22.5 ms to 258.0 ms,with energy consumption below 2.8 μJ. The results confirm that the proposed scheme offers an effective a balanced compromise between compactness, runtime efficiency, energy usage, memory requirements, and practical security guarantees, making it suitable for distributed architectures and resource-constrained IoT devices.
Published
2026-01-24
How to Cite
El ouafi, M., Lamrini Uahabi, K., Aslimani, A., & Zannou, A. (2026). Optimized Ambiguous-Key ECC Signatures for Lightweight and Secure IoT Systems. Statistics, Optimization & Information Computing. https://doi.org/10.19139/soic-2310-5070-3280
Issue
Section
Research Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).