The power of identification schemes

In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signatur...

Full description

Bibliographic Details
Main Authors: Kurosawa, Kaoru, Heng, Swee Huay
Format: Book Section
Language:English
Published: Springer 2006
Subjects:
Online Access:http://shdl.mmu.edu.my/2024/
http://shdl.mmu.edu.my/2024/1/11745853_24
_version_ 1848789942771122176
author Kurosawa, Kaoru
Heng, Swee Huay
author_facet Kurosawa, Kaoru
Heng, Swee Huay
author_sort Kurosawa, Kaoru
building MMU Institutional Repository
collection Online Access
description In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of Boneh-Boyen (BB) signature scheme which is not only on-line/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme.
first_indexed 2025-11-14T18:04:44Z
format Book Section
id mmu-2024
institution Multimedia University
institution_category Local University
language English
last_indexed 2025-11-14T18:04:44Z
publishDate 2006
publisher Springer
recordtype eprints
repository_type Digital Repository
spelling mmu-20242020-12-14T08:25:27Z http://shdl.mmu.edu.my/2024/ The power of identification schemes Kurosawa, Kaoru Heng, Swee Huay QA299.6-433 Analysis In this paper, we show that identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of identification schemes. We next propose a more efficient on-line/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of Boneh-Boyen (BB) signature scheme which is not only on-line/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme. Springer 2006 Book Section NonPeerReviewed text en http://shdl.mmu.edu.my/2024/1/11745853_24 Kurosawa, Kaoru and Heng, Swee Huay (2006) The power of identification schemes. In: Public Key Cryptography - PKC 2006. Lecture Notes in Computer Science, 3958 . Springer, pp. 364-377. ISBN 978-3-540-33851-2, 978-3-540-33852-9 https://link.springer.com/chapter/10.1007/11745853_24 https://doi.org/10.1007/11745853_24 https://doi.org/10.1007/11745853_24
spellingShingle QA299.6-433 Analysis
Kurosawa, Kaoru
Heng, Swee Huay
The power of identification schemes
title The power of identification schemes
title_full The power of identification schemes
title_fullStr The power of identification schemes
title_full_unstemmed The power of identification schemes
title_short The power of identification schemes
title_sort power of identification schemes
topic QA299.6-433 Analysis
url http://shdl.mmu.edu.my/2024/
http://shdl.mmu.edu.my/2024/
http://shdl.mmu.edu.my/2024/
http://shdl.mmu.edu.my/2024/1/11745853_24