The power of identification schemes

Citation

Kurosawa, Kaoru and Heng, Swee Huay (2006) The power of identification schemes. In: Public Key Cryptography - PKC 2006. Lecture Notes in Computer Science, 3958 . Springer, pp. 364-377. ISBN 978-3-540-33851-2, 978-3-540-33852-9

[img] Text
11745853_24
Restricted to Repository staff only

Download (80kB)

Abstract

In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of Boneh-Boyen (BB) signature scheme which is not only on-line/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme.

Item Type: Book Section
Uncontrolled Keywords: Identification scheme, signature scheme, trapdoor commitment scheme, on-line/off-line identity-based
Subjects: Q Science > QA Mathematics > QA299.6-433 Analysis
Divisions: Faculty of Information Science and Technology (FIST)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 10 Aug 2011 07:01
Last Modified: 14 Dec 2020 08:25
URII: http://shdl.mmu.edu.my/id/eprint/2024

Downloads

Downloads per month over past year

View ItemEdit (login required)