Title | ||
---|---|---|
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme |
Abstract | ||
---|---|---|
In USENIX 2001, Boneh et al. introduced a new way of obtaining fast revocation for RSA keys with the help of a security mediator. In 2003, Boneh et al. also showed how to convert the security-mediated RSA encryption scheme into an identity-based mediated RSA encryption scheme. This new technique addressed the shortcoming of identity-based cryptography where revocation required appending the valid date for a user's keys together with his identity-string, allowing for instant revocation of invalid user keys. Subsequently, many security-mediated cryptographic primitives were proposed. Surprisingly however, no work has yet to be done to address security-mediated identity-based identification schemes despite more than a decade has passed since this feature was incorporated into encryption and signature primitives. In this paper, we provide that contribution by defining the appropriate security notions for achieving fast revocation for identity-based identification schemes. Subsequently we show a concrete scheme that achieves these security notions under provable security. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/ASIAJCIS.2013.12 | AsiaJCIS |
Keywords | Field | DocType |
appropriate security notion,fast revocation,security notion,identity-based identification,rsa encryption scheme,instant revocation,security-mediated identity-based identification scheme,identity-string,identification scheme,identity-based mediated rsa encryption,user keys,rsa key,provable security,security notions,identity-based cryptography,identity-based identification scheme,public key cryptography,cryptographic primitives,digital signatures,security mediator,signature primitives,provable secure,games,encryption,protocols,servers | Internet privacy,Identification scheme,Computer science,Computer security,Cryptography,Concrete security,Digital signature,Cryptographic primitive,Encryption,Public-key cryptography,Provable security | Conference |
ISSN | Citations | PageRank |
2374-0205 | 0 | 0.34 |
References | Authors | |
8 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ji-Jian Chin | 1 | 60 | 24.41 |
Rouzbeh Behnia | 2 | 5 | 5.56 |
Swee-Huay Heng | 3 | 384 | 47.50 |
Raphael C. -Wei Phan | 4 | 0 | 0.34 |