Identity based identification from algebraic coding theory
Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discre...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7347 https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8350 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83502022-10-06T02:33:30Z Identity based identification from algebraic coding theory YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks. 2014-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7347 info:doi/10.1016/j.tcs.2013.09.008 https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Error-correcting codes Identification Identity based cryptography Syndrome decoding Information Security Programming Languages and Compilers |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Error-correcting codes Identification Identity based cryptography Syndrome decoding Information Security Programming Languages and Compilers |
spellingShingle |
Error-correcting codes Identification Identity based cryptography Syndrome decoding Information Security Programming Languages and Compilers YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. Identity based identification from algebraic coding theory |
description |
Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks. |
format |
text |
author |
YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. |
author_facet |
YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. |
author_sort |
YANG, Guomin |
title |
Identity based identification from algebraic coding theory |
title_short |
Identity based identification from algebraic coding theory |
title_full |
Identity based identification from algebraic coding theory |
title_fullStr |
Identity based identification from algebraic coding theory |
title_full_unstemmed |
Identity based identification from algebraic coding theory |
title_sort |
identity based identification from algebraic coding theory |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/7347 https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf |
_version_ |
1770576316631875584 |