The power of identification schemes

  • Authors:
  • Kaoru Kurosawa;Swee-Huay Heng

  • Affiliations:
  • Department of Computer and Information Sciences, Ibaraki University, 4-12-1 Nakanarusawa, Hitachi, Ibaraki 316-8511, Japan.;Multimedia University, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia

  • Venue:
  • International Journal of Applied Cryptography
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we show that Identification schemes (ID-schemes) are very powerful in some areas of cryptography. We first prove an equivalence between non-interactive trapdoor commitment schemes and a natural class of ID-schemes. We next propose a more efficient online/off-line signature transformation than Shamir-Tauman. As an application, we present a variant of the Boneh-Boyen (BB) signature scheme which is not only online/off-line but also has a smaller public key size than the original BB scheme. Finally, we present the first Identity-based ID-scheme which is secure against concurrent man-in-the-middle attack without random oracles by using our variant of BB signature scheme.