Identity-based identification without random oracles

This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisel...

Full description

Bibliographic Details
Main Authors: Kurosawa, Kaoru, Heng, Swee Huay
Format: Book Section
Language:English
Published: Springer 2005
Subjects:
Online Access:http://shdl.mmu.edu.my/2308/
http://shdl.mmu.edu.my/2308/1/11424826_64
_version_ 1848790021424807936
author Kurosawa, Kaoru
Heng, Swee Huay
author_facet Kurosawa, Kaoru
Heng, Swee Huay
author_sort Kurosawa, Kaoru
building MMU Institutional Repository
collection Online Access
description This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks.
first_indexed 2025-11-14T18:05:59Z
format Book Section
id mmu-2308
institution Multimedia University
institution_category Local University
language English
last_indexed 2025-11-14T18:05:59Z
publishDate 2005
publisher Springer
recordtype eprints
repository_type Digital Repository
spelling mmu-23082020-12-14T08:21:50Z http://shdl.mmu.edu.my/2308/ Identity-based identification without random oracles Kurosawa, Kaoru Heng, Swee Huay QA299.6-433 Analysis This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks. Springer 2005 Book Section NonPeerReviewed text en http://shdl.mmu.edu.my/2308/1/11424826_64 Kurosawa, Kaoru and Heng, Swee Huay (2005) Identity-based identification without random oracles. In: Computational Science and Its Applications – ICCSA 2005. Lecture Notes in Computer Science, 3481 . Springer, pp. 603-613. ISBN 978-3-540-25861-2, 978-3-540-32044-9 https://link.springer.com/chapter/10.1007/11424826_64 https://doi.org/10.1007/11424826_64 https://doi.org/10.1007/11424826_64
spellingShingle QA299.6-433 Analysis
Kurosawa, Kaoru
Heng, Swee Huay
Identity-based identification without random oracles
title Identity-based identification without random oracles
title_full Identity-based identification without random oracles
title_fullStr Identity-based identification without random oracles
title_full_unstemmed Identity-based identification without random oracles
title_short Identity-based identification without random oracles
title_sort identity-based identification without random oracles
topic QA299.6-433 Analysis
url http://shdl.mmu.edu.my/2308/
http://shdl.mmu.edu.my/2308/
http://shdl.mmu.edu.my/2308/
http://shdl.mmu.edu.my/2308/1/11424826_64