A more natural way to construct identity-based identification schemes

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

5 Scopus Citations
View graph of relations

Author(s)

  • Guomin Yang
  • Jing Chen
  • Duncan S. Wong
  • Xiaotie Deng
  • Dongsheng Wang

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security
Subtitle of host publication5th International Conference, ACNS 2007, Proceedings
PublisherSpringer Verlag
Pages307-322
Volume4521 LNCS
ISBN (print)9783540727378
Publication statusPublished - 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4521 LNCS
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Conference

Title5th International Conference on Applied Cryptography and Network Security, ACNS 2007
PlaceChina
CityZhuhai
Period5 - 8 June 2007

Abstract

Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a public verifier who knows only the claimed identity of the prover and some common information. In this paper, we propose a simple and efficient framework for constructing IBI schemes. Unlike some related framework which constructs IBI schemes from some standard identification schemes, our framework is based on some more fundamental assumptions on intractable problems. Depending on the features of the underlying intractable problems presumed in our framework, we can derive IBI schemes secure against passive, active and concurrent adversaries. We show that the framework can capture a large class of schemes currently proposed, and also has the potential to cover many newly constructed schemes. As an example, based on the Katz-Wang standard signature scheme, we propose a new IBI scheme that is secure against active adversaries in a concurrent manner. It can be seen that our framework also help simplify the security proofs for new IBI schemes. Finally, and of independent interest, we define a new notion for proof systems called Witness Dualism. This notion is weaker than that of witness indistinguishable and we show that it is enough for constructing an IBI scheme secure against the most powerful type of adversaries defined. © Springer-Verlag Berlin Heidelberg 2007.

Research Area(s)

  • Concurrent attacks, Identification schemes, Identity-based cryptography

Citation Format(s)

A more natural way to construct identity-based identification schemes. / Yang, Guomin; Chen, Jing; Wong, Duncan S. et al.
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Proceedings. Vol. 4521 LNCS Springer Verlag, 2007. p. 307-322 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4521 LNCS).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review