Citation
Kurosawa, Kaoru and Heng, Swee Huay (2005) Identity-based identification without random oracles. In: Computational Science and Its Applications – ICCSA 2005. Lecture Notes in Computer Science, 3481 . Springer, pp. 603-613. ISBN 978-3-540-25861-2, 978-3-540-32044-9
Text
11424826_64 Restricted to Repository staff only Download (67kB) |
Official URL: https://link.springer.com/chapter/10.1007/11424826...
Abstract
This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | System identification, ID-based cryptography, identification scheme |
Subjects: | Q Science > QA Mathematics > QA299.6-433 Analysis |
Divisions: | Faculty of Information Science and Technology (FIST) |
Depositing User: | Ms Rosnani Abd Wahab |
Date Deposited: | 24 Aug 2011 05:17 |
Last Modified: | 14 Dec 2020 08:21 |
URII: | http://shdl.mmu.edu.my/id/eprint/2308 |
Downloads
Downloads per month over past year
Edit (login required) |