ECQV-IBI: Identity-based identification with implicit certification
Tài liệu tham khảo
Braeken, 2020, Highly efficient symmetric key based authentication and key agreement protocol using keccak, Sensors, 2020, 2160, 10.3390/s20082160
Kurosawa, 2004, From digital signature to ID-based identification/signature, 248
Bellare, 2004, Security proofs for identity-based identification and signature schemes, 268
Gentry, 2003, Certificate-based encryption and the certificate revocation problem, 272
Chin J-J, Phan RC-W, Behnia R, Heng S-H. An efficient and provably secure certificateless identification scheme. In: 2013 international conference on security and cryptography (SECRYPT), 2013, pp. 1–8.
Al-Riyami, 2003, Certificateless public key cryptography, 452
Brown, 2002, Provably secure implicit certificate schemes, 156
Günther, 1990, An identity-based key-exchange protocol, 29
Girault, 1991, Self-certified public keys, 490
Pintsov, 2001, Postal revenue collection in the digital age, 105
Fujioka, 2012, Applicability of OR-proof techniques to hierarchical identity-based identification, 7712, 169
Chin, 2015, Reset-secure identity-based identification schemes without pairings, 227
Tang, 2020, Identity-based identification scheme without trusted party against concurrent attacks, Secur Commun Netw, 2020, 8820271:1, 10.1155/2020/8820271
Huang, 2007, Certificateless signature revisited, 308
Chin, 2015, A provable secure pairing-free certificateless identification scheme, Int J Comput Math, 92, 1520, 10.1080/00207160.2014.957196
Chin, 2014, An efficient and provable secure certificateless identification scheme in the standard model, KSII Trans Internet Inf Syst, 8, 2532
Bellare, 2002, Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, 162
Heng, 2004, Design and analysis of some cryptographic primitives
Tan, 2011, A variant of schnorr identity-based identification scheme with tight reduction, 361
Chin, 2015, Twin-schnorr: A security upgrade for the schnorr identity-based identification scheme, Sci World J, 2015, 10.1155/2015/237514
Chin, 2015, Twin-beth: Security under active and concurrent attacks for the beth identity-based identification scheme, Cryptogr Commun, 8, 579, 10.1007/s12095-015-0162-5
Patonico, 2021