An identity based-identification scheme with tight security against active and concurrent adversaries

J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
… ) short signature scheme which has the advantage of shorter keys. We show tight security
reduction against active and concurrent attackers (imp-aa/ca) on our scheme that is obtained …

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme

JJ Chin, SY Tan, SH Heng, RCW Phan - Cryptography and …, 2016 - Springer
… on the active and concurrent security of the Beth-IBI scheme. … active and concurrent-secure
standard identification scheme as well as a semi-strong unforgeable signature scheme

A variant of Schnorr identity-based identification scheme with tight reduction

SY Tan, SH Heng, RCW Phan, BM Goi - Future Generation Information …, 2011 - Springer
… from Reset Lemma, Schnorr identitybased identification (IBI) can be proven secure
against impersonation under passive attack, and active and concurrent attacks if the discrete …

A new framework for the design and analysis of identity-based identification schemes

G Yang, J Chen, DS Wong, X Deng, D Wang - Theoretical Computer …, 2008 - Elsevier
… exists a trapdoor strong-one-… schemes with id-imp-pa security (Section 3.1), we transform
it to a framework for constructing IBI schemes secure against active and concurrent attacks (ie id

Identity-based identification scheme secure against concurrent-reset attacks without random oracles

P Thorncharoensri, W Susilo, Y Mu - Information Security Applications …, 2009 - Springer
… the first identity-based identification scheme that is provably secure against concurrent-reset …
+ attack is based on a variant of q-Strong Diffie-Hellman (SDH) assumption, that we call 2-…

A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures

J Chia, JJ Chin, SC Yip - Symmetry, 2021 - mdpi.com
identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr
signature scheme … -3 pairings and has tight security against active and concurrent attackers. …

Twin‐Schnorr: A Security Upgrade for the Schnorr IdentityBased Identification Scheme

JJ Chin, SY Tan, SH Heng… - The Scientific World …, 2015 - Wiley Online Library
… the scheme to be secure against impersonation under active and concurrent attacks, a
modified strong … proof of security against impersonation under active and concurrent attacks. In …

On the security of beth's identification schemes against active and concurrent adversaries

G Di Crescenzo - Mathematical Methods in Computer Science: Essays in …, 2008 - Springer
… By using this approach, the authors in [1] surfaced an identification scheme in the standard
… of) the identity-based identification scheme in [6]. They also proved this scheme to be secure

New identity-based identification and signature schemes in the standard model

SY Tan, SH Heng - … Conference on Availability, Reliability and Security, 2023 - dl.acm.org
… against impersonation under active and concurrent attacks in … IBS scheme that is provably
secure against strong existential … analysis of identity-based identification schemes. Theoretical …

An improved efficient provable secure identity-Based identification scheme in the standard model

SY Tan, JJ Chin, SH Heng, BM Goi - KSII Transactions on Internet …, 2013 - koreascience.kr
scheme was only proven secure against passive impersonators, while their second scheme
that is secure against active and concurrent … is also complex as it required a strong one-time …