Security Proofs for Identity-Based Identification and Signature Schemes

  • Authors:
  • Mihir Bellare;Chanathip Namprempre;Gregory Neven

  • Affiliations:
  • University of California, San Diego, Dept. of Computer Science & Engineering, 9500 Gilman Drive, 92093, La Jolla, CA, USA;Thammasat University, Electrical Engineering Dept., Klong Luang, 12121, Patumtani, Thailand;IBM Zürich Research Laboratory, Säumerstrasse 4, 8803, Rüschlikon, Switzerland

  • Venue:
  • Journal of Cryptology
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these is a framework that on the one hand helps explain how these schemes are derived and on the other hand enables modular security analyses, thereby helping to understand, simplify, and unify previous work. We also analyze a generic folklore construction that in particular yields identity-based identification and signature schemes without random oracles.