Security enhancements by OR-proof in identity-based identification

  • Authors:
  • Atsushi Fujioka;Taiichi Saito;Keita Xagawa

  • Affiliations:
  • NTT Secure Platform Laboratories, Japan;Tokyo Denki University, Japan;NTT Secure Platform Laboratories, Japan

  • Venue:
  • ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate three security enhancement transformations, based on the well known OR-proof technique, in identity-based identification (IBI) protocols and show a required condition of the underlying IBI protocols. The transformations can convert an IBI protocol, which satisfies a property similar to the Σ-protocol and is secure against impersonation under passive attacks, to one secure against impersonation under concurrent attacks in both adaptive and weak selective identity attack models. In addition, we argue that enhancing the security in the static identity attack model with two of the transformations seem to be difficult; however, we prove that the other can convert an IBI protocol, which satisfies another property, in the model.