How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Zero-knowledge proofs of identity
Journal of Cryptology
Witness indistinguishable and witness hiding protocols
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The power of identification schemes
International Journal of Applied Cryptography
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
Information Security Applications
Adaptively secure identity-based identification from lattices without random oracles
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Construction of identity based signcryption schemes
WISA'10 Proceedings of the 11th international conference on Information security applications
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Java implementation for pairing-based cryptosystems
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
The power of identification schemes
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A variant of schnorr identity-based identification scheme with tight reduction
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Security enhancements by OR-proof in identity-based identification
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Identity based identification from algebraic coding theory
Theoretical Computer Science
Hi-index | 0.00 |
This paper shows identity-based (ID-based) identification schemes which are provably secure in the standard model. The schemes are derived from Boneh-Boyen signature scheme, a signature scheme which is provably secure in the standard model based on the strong Diffie-Hellman assumption. More precisely, we present two canonical schemes, namely, a scheme which is secure against impersonation under passive attack, and a scheme which is secure against impersonation under active and concurrent attacks.