Design and analysis of identification schemes without certificates

Citation

Chin, Ji Jian (2014) Design and analysis of identification schemes without certificates. PhD thesis, Multimedia University.

Full text not available from this repository.

Abstract

This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using his identity-string. The section of the thesis begins with a review of Crescenzo’s attempt to tackle Bellare et al.’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result showing that Crescenzo’s solution is flawed. An alternative solution is presented to achieve security against active/concurrent attackers with even better security guarantee using the discrete logarithm assumption instead of its one-more counterpart. Furthermore, this technique is extended to Schnorr’s IBI scheme as well, resulting in two schemes provable secure in the random oracle model.

Item Type: Thesis (PhD)
Additional Information: Call no.: QA76.9.A25 C45 2014
Uncontrolled Keywords: Cryptography--Access control. Computer security.
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Information Science and Technology (FIST)
Depositing User: Ms Nurul Iqtiani Ahmad
Date Deposited: 11 Jan 2016 10:56
Last Modified: 11 Jan 2016 10:56
URII: http://shdl.mmu.edu.my/id/eprint/6236

Downloads

Downloads per month over past year

View ItemEdit (login required)