Security Proofs for Identity-Based Identification and Signature Schemes

被引:0
|
作者
Mihir Bellare
Chanathip Namprempre
Gregory Neven
机构
[1] University of California,Dept. of Computer Science & Engineering
[2] San Diego,Electrical Engineering Dept.
[3] Thammasat University,undefined
[4] IBM Zürich Research Laboratory,undefined
来源
Journal of Cryptology | 2009年 / 22卷
关键词
Identity-based cryptography; Identification schemes; Signatures; Security proofs;
D O I
暂无
中图分类号
学科分类号
摘要
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these is a framework that on the one hand helps explain how these schemes are derived and on the other hand enables modular security analyses, thereby helping to understand, simplify, and unify previous work. We also analyze a generic folklore construction that in particular yields identity-based identification and signature schemes without random oracles.
引用
收藏
页码:1 / 61
页数:60
相关论文
共 50 条
  • [1] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [2] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [3] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [4] Security analysis of batch verification on identity-based signature schemes
    Chiang, Han-Fei
    Yen, Sung-Ming
    Lin, Hsi-Chung
    [J]. PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
  • [5] New Identity-Based Identification and Signature Schemes in the Standard Model
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [6] On the security of an identity-based signature scheme
    [J]. Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [7] Security proofs for signature schemes
    Pointcheval, D
    Stern, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 387 - 398
  • [8] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39
  • [9] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    [J]. The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [10] Hierarchical Identity-Based Identification Schemes
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 93 - +