Title | ||
---|---|---|
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme |
Abstract | ||
---|---|---|
In 2004, Bellare et al. formalized the notion for identity-based identification (IBI) schemes and proposed many schemes based on their transformation from standard identification schemes. However the authors left the security under active/concurrent attacks of one of the pairing-free schemes, the Beth-IBI scheme, as an open problem. In 2008, Crescenzo provided the solution to this open problem with a small modification to the original Beth-IBI scheme. However, recently Chin et al. pointed out security flaws in Crescenzo's modified Beth-IBI scheme, resulting in total break of the scheme and leaving Bellare et al's open problem unanswered once more. In this paper, we provide a solution to the open problem, showing that with only some additional overhead to modify the original Beth-IBI scheme we can achieve security against active and concurrent attacks. Furthermore, our security guarantee results are superior to Crescenzo's attempt in that we rely only on the classical discrete-logarithm assumption for our active and concurrent security proof, which is a weaker assumption than Crescenzo's one-more counterpart. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/s12095-015-0162-5 | Cryptography and Communications |
Keywords | Field | DocType |
Beth-IBI,Identity-based,Identification,Active/concurrent security,Provable security,Pairing-free,Discrete logarithm,94A60 | Open problem,Identification scheme,Computer security,Mathematics,Discrete logarithm,Provable security | Journal |
Volume | Issue | ISSN |
8 | 4 | 1936-2447 |
Citations | PageRank | References |
0 | 0.34 | 13 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ji-Jian Chin | 1 | 60 | 24.41 |
Syh-Yuan Tan | 2 | 37 | 20.43 |
Swee-Huay Heng | 3 | 384 | 47.50 |
Raphael C.-W. Phan | 4 | 703 | 66.89 |