Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Witness indistinguishable and witness hiding protocols
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
Security Proofs for Identity-Based Identification and Signature Schemes
Journal of Cryptology
Adaptively secure identity-based identification from lattices without random oracles
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Identity-based identification without random oracles
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Secure hierarchical identity-based identification without random oracles
ISC'12 Proceedings of the 15th international conference on Information Security
Security enhancement of identity-based identification with reversibility
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Identity based identification from algebraic coding theory
Theoretical Computer Science
Hi-index | 0.00 |
We investigate three security enhancement transformations, based on the well known OR-proof technique, in identity-based identification (IBI) protocols and show a required condition of the underlying IBI protocols. The transformations can convert an IBI protocol, which satisfies a property similar to the Σ-protocol and is secure against impersonation under passive attacks, to one secure against impersonation under concurrent attacks in both adaptive and weak selective identity attack models. In addition, we argue that enhancing the security in the static identity attack model with two of the transformations seem to be difficult; however, we prove that the other can convert an IBI protocol, which satisfies another property, in the model.