An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …
machines or their users over computer networks. As conventional public key schemes …
Identity-based identification schemes from ID-KEMs
P Barapatre, C Pandu Rangan - … 2013, Kharagpur, India, October 19-23 …, 2013 - Springer
Identity-based identification (IBI) schemes are means to achieve entity identification in the
identity-based setting in a secure fashion. Quite a large number of IBI schemes exist, but …
identity-based setting in a secure fashion. Quite a large number of IBI schemes exist, but …
New identity-based identification and signature schemes in the standard model
In this paper, we propose an efficient identity-based identification (IBI) scheme provably
secure against impersonation under active and concurrent attacks in the standard model …
secure against impersonation under active and concurrent attacks in the standard model …
An efficient and provable secure identity-based identification scheme in the standard model
We present an efficient and provable secure identity-based identification scheme in the
standard model. Our proposed scheme is secure against impersonation under passive …
standard model. Our proposed scheme is secure against impersonation under passive …
On the security of a modified Beth identity-based identification scheme
In their seminal work for identity-based identification (IBI) schemes in 2004, Bellare et al. left
open the question of whether the Beth identification scheme, and consequently the derived …
open the question of whether the Beth identification scheme, and consequently the derived …
Identity-based identification without random oracles
K Kurosawa, SH Heng - … Science and Its Applications–ICCSA 2005 …, 2005 - Springer
This paper shows identity-based (ID-based) identification schemes which are provably
secure in the standard model. The schemes are derived from Boneh-Boyen signature …
secure in the standard model. The schemes are derived from Boneh-Boyen signature …
[PDF][PDF] Identity-Based Cryptosystems.
B Libert, JJ Quisquater - … of Cryptography and Security (2nd Ed.), 2011 - researchgate.net
Background Identity-based public key cryptography is a paradigm introduced by Shamir
in[]. His motivation was to simplify key management and remove the need for …
in[]. His motivation was to simplify key management and remove the need for …
A more natural way to construct identity-based identification schemes
Constructing identification schemes is one of the fundamental problems in cryptography,
and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to …
and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to …
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme
In 2004, Bellare et al. formalized the notion for identity-based identification (IBI) schemes
and proposed many schemes based on their transformation from standard identification …
and proposed many schemes based on their transformation from standard identification …
[PDF][PDF] An identity-based mediated signature scheme without trusted pkg
X Wang, S Wang - Informatica, 2011 - informatica.si
The ID-based public key cryptosystems allow public keys of a user to be computed easily
and publicly from a string to correspond with his (her) identity (such as name, telephone …
and publicly from a string to correspond with his (her) identity (such as name, telephone …