The power of identification schemes
In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signatur...
| Main Authors: | , |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
Springer
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2024/ http://shdl.mmu.edu.my/2024/1/11745853_24 |
| _version_ | 1848789942771122176 |
|---|---|
| author | Kurosawa, Kaoru Heng, Swee Huay |
| author_facet | Kurosawa, Kaoru Heng, Swee Huay |
| author_sort | Kurosawa, Kaoru |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of Boneh-Boyen (BB) signature scheme which is not only on-line/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme. |
| first_indexed | 2025-11-14T18:04:44Z |
| format | Book Section |
| id | mmu-2024 |
| institution | Multimedia University |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T18:04:44Z |
| publishDate | 2006 |
| publisher | Springer |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-20242020-12-14T08:25:27Z http://shdl.mmu.edu.my/2024/ The power of identification schemes Kurosawa, Kaoru Heng, Swee Huay QA299.6-433 Analysis In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of Boneh-Boyen (BB) signature scheme which is not only on-line/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme. Springer 2006 Book Section NonPeerReviewed text en http://shdl.mmu.edu.my/2024/1/11745853_24 Kurosawa, Kaoru and Heng, Swee Huay (2006) The power of identification schemes. In: Public Key Cryptography - PKC 2006. Lecture Notes in Computer Science, 3958 . Springer, pp. 364-377. ISBN 978-3-540-33851-2, 978-3-540-33852-9 https://link.springer.com/chapter/10.1007/11745853_24 https://doi.org/10.1007/11745853_24 https://doi.org/10.1007/11745853_24 |
| spellingShingle | QA299.6-433 Analysis Kurosawa, Kaoru Heng, Swee Huay The power of identification schemes |
| title | The power of identification schemes |
| title_full | The power of identification schemes |
| title_fullStr | The power of identification schemes |
| title_full_unstemmed | The power of identification schemes |
| title_short | The power of identification schemes |
| title_sort | power of identification schemes |
| topic | QA299.6-433 Analysis |
| url | http://shdl.mmu.edu.my/2024/ http://shdl.mmu.edu.my/2024/ http://shdl.mmu.edu.my/2024/ http://shdl.mmu.edu.my/2024/1/11745853_24 |