Title | ||
---|---|---|
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles |
Abstract | ||
---|---|---|
The notion of identity-based cryptography was put forward by Shamir in 1984. This setting has also been considered in identification schemes. Since then, many identity-based identification schemes have been proposed. Nonetheless, most of them only resist against concurrent attacks. In this paper, we consider the most stringent attack in identification schemes, namely the reset attacks. The aim of this paper is to present the first identity-based identification scheme that is provably secure against concurrent-reset attacks (CR1) based on the 2-SDH assumption. We shall elaborate the 2-SDH assumption, which is weaker than the well known q-SDH assumption. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-10838-9_8 | WISA |
Keywords | Field | DocType |
Identification scheme, Identity-based, Reset Attack, Concurrent Attack, Bilinear Pairings | Identification scheme,Cryptography,Computer security,Computer science | Conference |
Volume | ISSN | Citations |
5932 | 0302-9743 | 3 |
PageRank | References | Authors |
0.41 | 13 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Pairat Thorncharoensri | 1 | 6 | 3.51 |
Willy Susilo | 2 | 4823 | 353.18 |
Yi Mu | 3 | 2884 | 239.05 |