Identity-based identification without random oracles
This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisel...
| Main Authors: | , |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
Springer
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2308/ http://shdl.mmu.edu.my/2308/1/11424826_64 |
| _version_ | 1848790021424807936 |
|---|---|
| author | Kurosawa, Kaoru Heng, Swee Huay |
| author_facet | Kurosawa, Kaoru Heng, Swee Huay |
| author_sort | Kurosawa, Kaoru |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks. |
| first_indexed | 2025-11-14T18:05:59Z |
| format | Book Section |
| id | mmu-2308 |
| institution | Multimedia University |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T18:05:59Z |
| publishDate | 2005 |
| publisher | Springer |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-23082020-12-14T08:21:50Z http://shdl.mmu.edu.my/2308/ Identity-based identification without random oracles Kurosawa, Kaoru Heng, Swee Huay QA299.6-433 Analysis This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks. Springer 2005 Book Section NonPeerReviewed text en http://shdl.mmu.edu.my/2308/1/11424826_64 Kurosawa, Kaoru and Heng, Swee Huay (2005) Identity-based identification without random oracles. In: Computational Science and Its Applications – ICCSA 2005. Lecture Notes in Computer Science, 3481 . Springer, pp. 603-613. ISBN 978-3-540-25861-2, 978-3-540-32044-9 https://link.springer.com/chapter/10.1007/11424826_64 https://doi.org/10.1007/11424826_64 https://doi.org/10.1007/11424826_64 |
| spellingShingle | QA299.6-433 Analysis Kurosawa, Kaoru Heng, Swee Huay Identity-based identification without random oracles |
| title | Identity-based identification without random oracles |
| title_full | Identity-based identification without random oracles |
| title_fullStr | Identity-based identification without random oracles |
| title_full_unstemmed | Identity-based identification without random oracles |
| title_short | Identity-based identification without random oracles |
| title_sort | identity-based identification without random oracles |
| topic | QA299.6-433 Analysis |
| url | http://shdl.mmu.edu.my/2308/ http://shdl.mmu.edu.my/2308/ http://shdl.mmu.edu.my/2308/ http://shdl.mmu.edu.my/2308/1/11424826_64 |