An identity based-identification scheme with tight security against active and concurrent adversaries

J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …

Identity-based identification schemes from ID-KEMs

P Barapatre, C Pandu Rangan - … 2013, Kharagpur, India, October 19-23 …, 2013 - Springer
Identity-based identification (IBI) schemes are means to achieve entity identification in the
identity-based setting in a secure fashion. Quite a large number of IBI schemes exist, but …

New identity-based identification and signature schemes in the standard model

SY Tan, SH Heng - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
In this paper, we propose an efficient identity-based identification (IBI) scheme provably
secure against impersonation under active and concurrent attacks in the standard model …

An efficient and provable secure identity-based identification scheme in the standard model

JJ Chin, SH Heng, BM Goi - Public Key Infrastructure: 5th European PKI …, 2008 - Springer
We present an efficient and provable secure identity-based identification scheme in the
standard model. Our proposed scheme is secure against impersonation under passive …

On the security of a modified Beth identity-based identification scheme

JJ Chin, SY Tan, SH Heng, RCW Phan - Information Processing Letters, 2013 - Elsevier
In their seminal work for identity-based identification (IBI) schemes in 2004, Bellare et al. left
open the question of whether the Beth identification scheme, and consequently the derived …

Identity-based identification without random oracles

K Kurosawa, SH Heng - … Science and Its Applications–ICCSA 2005 …, 2005 - Springer
This paper shows identity-based (ID-based) identification schemes which are provably
secure in the standard model. The schemes are derived from Boneh-Boyen signature …

[PDF][PDF] Identity-Based Cryptosystems.

B Libert, JJ Quisquater - … of Cryptography and Security (2nd Ed.), 2011 - researchgate.net
Background Identity-based public key cryptography is a paradigm introduced by Shamir
in[]. His motivation was to simplify key management and remove the need for …

A more natural way to construct identity-based identification schemes

G Yang, J Chen, DS Wong, X Deng, D Wang - Applied Cryptography and …, 2007 - Springer
Constructing identification schemes is one of the fundamental problems in cryptography,
and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to …

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme

JJ Chin, SY Tan, SH Heng, RCW Phan - Cryptography and …, 2016 - Springer
In 2004, Bellare et al. formalized the notion for identity-based identification (IBI) schemes
and proposed many schemes based on their transformation from standard identification …

[PDF][PDF] An identity-based mediated signature scheme without trusted pkg

X Wang, S Wang - Informatica, 2011 - informatica.si
The ID-based public key cryptosystems allow public keys of a user to be computed easily
and publicly from a string to correspond with his (her) identity (such as name, telephone …