Identity based identification from algebraic coding theory

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discre...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, TAN, Chik How, MU, Yi, SUSILO, Willy, WONG, Duncan S.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7347
https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8350
record_format dspace
spelling sg-smu-ink.sis_research-83502022-10-06T02:33:30Z Identity based identification from algebraic coding theory YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks. 2014-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7347 info:doi/10.1016/j.tcs.2013.09.008 https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Error-correcting codes Identification Identity based cryptography Syndrome decoding Information Security Programming Languages and Compilers
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Error-correcting codes
Identification
Identity based cryptography
Syndrome decoding
Information Security
Programming Languages and Compilers
spellingShingle Error-correcting codes
Identification
Identity based cryptography
Syndrome decoding
Information Security
Programming Languages and Compilers
YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
Identity based identification from algebraic coding theory
description Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks.
format text
author YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_facet YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_sort YANG, Guomin
title Identity based identification from algebraic coding theory
title_short Identity based identification from algebraic coding theory
title_full Identity based identification from algebraic coding theory
title_fullStr Identity based identification from algebraic coding theory
title_full_unstemmed Identity based identification from algebraic coding theory
title_sort identity based identification from algebraic coding theory
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/7347
https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf
_version_ 1770576316631875584