Security upgrade for a K-resilient identity-based identification scheme in the standard model

Chin, Ji Jian and Heng, Swee Huay (2013) Security upgrade for a K-resilient identity-based identification scheme in the standard model. Malaysian Journal of Mathematical Sciences, 7 (S). pp. 73-85. ISSN 1823-8343

[img] Text
9.pdf
Restricted to Repository staff only

Download (127kB)
Official URL: http://einspem.upm.edu.my/journal/fullpaper/vol7ne...

Abstract

In 2010, Heng and Chin (2010) proposed an identity-based identification (IBI) scheme in the standard model which was resilient to a coalition of attackers conspiring together to break the scheme. They argued that the scheme was desirable due to its proof in the standard model, which is still rare in existing literature. Also desirable was that the proposed scheme was designed without bilinear pairings, which costs greatly in terms of operation costs, thereby allowing the scheme to run more efficiently. However, the proof of security for the proposed scheme was only against impersonation under passive attacks, where the adversary is only allowed to eavesdrop on conversations between honest parties during the identification protocol. In this paper, we upgrade the security proof to prove that the scheme is also secure against impersonation under active and concurrent attacks, showing that the scheme is still secure even if the adversary is to interact with honest parties during the attack.

Item Type: Article
Additional Information: Malaysian Journal of Mathematical Sciences 7(S): 73-85 (2013) Special Issue: The 3rd International Conference on Cryptology & Computer Security 2012 (CRYPTOLOGY2012)
Uncontrolled Keywords: Identity-based identification (IBI), identification protocol, security
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Information Science and Technology (FIST)
Faculty of Engineering (FOE)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 06 Jan 2014 05:03
Last Modified: 10 Jan 2017 09:45
URI: http://shdl.mmu.edu.my/id/eprint/4734

Actions (login required)

View Item View Item