ECQV-IBI: Identity-based identification with implicit certification

Journal of Information Security and Applications - Tập 63 - Trang 103027 - 2021
An Braeken1, Ji-Jian Chin2,3, Syh-Yuan Tan4
1Vrije Universiteit Brussel, Belgium
2Faculty of Engineering, Multimedia University, Malaysia
3Information Security Lab, MIMOS Berhad, Malaysia
4School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom

Tài liệu tham khảo

Braeken, 2020, Highly efficient symmetric key based authentication and key agreement protocol using keccak, Sensors, 2020, 2160, 10.3390/s20082160 Kurosawa, 2004, From digital signature to ID-based identification/signature, 248 Bellare, 2004, Security proofs for identity-based identification and signature schemes, 268 Gentry, 2003, Certificate-based encryption and the certificate revocation problem, 272 Chin J-J, Phan RC-W, Behnia R, Heng S-H. An efficient and provably secure certificateless identification scheme. In: 2013 international conference on security and cryptography (SECRYPT), 2013, pp. 1–8. Al-Riyami, 2003, Certificateless public key cryptography, 452 Brown, 2002, Provably secure implicit certificate schemes, 156 Günther, 1990, An identity-based key-exchange protocol, 29 Girault, 1991, Self-certified public keys, 490 Pintsov, 2001, Postal revenue collection in the digital age, 105 Fujioka, 2012, Applicability of OR-proof techniques to hierarchical identity-based identification, 7712, 169 Chin, 2015, Reset-secure identity-based identification schemes without pairings, 227 Tang, 2020, Identity-based identification scheme without trusted party against concurrent attacks, Secur Commun Netw, 2020, 8820271:1, 10.1155/2020/8820271 Huang, 2007, Certificateless signature revisited, 308 Chin, 2015, A provable secure pairing-free certificateless identification scheme, Int J Comput Math, 92, 1520, 10.1080/00207160.2014.957196 Chin, 2014, An efficient and provable secure certificateless identification scheme in the standard model, KSII Trans Internet Inf Syst, 8, 2532 Bellare, 2002, Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, 162 Heng, 2004, Design and analysis of some cryptographic primitives Tan, 2011, A variant of schnorr identity-based identification scheme with tight reduction, 361 Chin, 2015, Twin-schnorr: A security upgrade for the schnorr identity-based identification scheme, Sci World J, 2015, 10.1155/2015/237514 Chin, 2015, Twin-beth: Security under active and concurrent attacks for the beth identity-based identification scheme, Cryptogr Commun, 8, 579, 10.1007/s12095-015-0162-5 Patonico, 2021