An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
… ) short signature scheme which has the advantage of shorter keys. We show tight security
reduction against active and concurrent attackers (imp-aa/ca) on our scheme that is obtained …
reduction against active and concurrent attackers (imp-aa/ca) on our scheme that is obtained …
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme
… on the active and concurrent security of the Beth-IBI scheme. … active and concurrent-secure
standard identification scheme as well as a semi-strong unforgeable signature scheme…
standard identification scheme as well as a semi-strong unforgeable signature scheme…
A variant of Schnorr identity-based identification scheme with tight reduction
… from Reset Lemma, Schnorr identitybased identification (IBI) can be proven secure
against impersonation under passive attack, and active and concurrent attacks if the discrete …
against impersonation under passive attack, and active and concurrent attacks if the discrete …
A new framework for the design and analysis of identity-based identification schemes
… exists a trapdoor strong-one-… schemes with id-imp-pa security (Section 3.1), we transform
it to a framework for constructing IBI schemes secure against active and concurrent attacks (ie id…
it to a framework for constructing IBI schemes secure against active and concurrent attacks (ie id…
Identity-based identification scheme secure against concurrent-reset attacks without random oracles
… the first identity-based identification scheme that is provably secure against concurrent-reset …
+ attack is based on a variant of q-Strong Diffie-Hellman (SDH) assumption, that we call 2-…
+ attack is based on a variant of q-Strong Diffie-Hellman (SDH) assumption, that we call 2-…
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
… identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr
signature scheme … -3 pairings and has tight security against active and concurrent attackers. …
signature scheme … -3 pairings and has tight security against active and concurrent attackers. …
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme
… the scheme to be secure against impersonation under active and concurrent attacks, a
modified strong … proof of security against impersonation under active and concurrent attacks. In …
modified strong … proof of security against impersonation under active and concurrent attacks. In …
On the security of beth's identification schemes against active and concurrent adversaries
G Di Crescenzo - Mathematical Methods in Computer Science: Essays in …, 2008 - Springer
… By using this approach, the authors in [1] surfaced an identification scheme in the standard
… of) the identity-based identification scheme in [6]. They also proved this scheme to be secure …
… of) the identity-based identification scheme in [6]. They also proved this scheme to be secure …
New identity-based identification and signature schemes in the standard model
… against impersonation under active and concurrent attacks in … IBS scheme that is provably
secure against strong existential … analysis of identity-based identification schemes. Theoretical …
secure against strong existential … analysis of identity-based identification schemes. Theoretical …
An improved efficient provable secure identity-Based identification scheme in the standard model
… scheme was only proven secure against passive impersonators, while their second scheme
that is secure against active and concurrent … is also complex as it required a strong one-time …
that is secure against active and concurrent … is also complex as it required a strong one-time …