Identity based identification from algebraic coding theory

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discre...

全面介紹

Saved in:
書目詳細資料
Main Authors: YANG, Guomin, TAN, Chik How, MU, Yi, SUSILO, Willy, WONG, Duncan S.
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2014
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/7347
https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
id sg-smu-ink.sis_research-8350
record_format dspace
spelling sg-smu-ink.sis_research-83502022-10-06T02:33:30Z Identity based identification from algebraic coding theory YANG, Guomin TAN, Chik How MU, Yi SUSILO, Willy WONG, Duncan S. Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks. 2014-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7347 info:doi/10.1016/j.tcs.2013.09.008 https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Error-correcting codes Identification Identity based cryptography Syndrome decoding Information Security Programming Languages and Compilers
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Error-correcting codes
Identification
Identity based cryptography
Syndrome decoding
Information Security
Programming Languages and Compilers
spellingShingle Error-correcting codes
Identification
Identity based cryptography
Syndrome decoding
Information Security
Programming Languages and Compilers
YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
Identity based identification from algebraic coding theory
description Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks.
format text
author YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_facet YANG, Guomin
TAN, Chik How
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_sort YANG, Guomin
title Identity based identification from algebraic coding theory
title_short Identity based identification from algebraic coding theory
title_full Identity based identification from algebraic coding theory
title_fullStr Identity based identification from algebraic coding theory
title_full_unstemmed Identity based identification from algebraic coding theory
title_sort identity based identification from algebraic coding theory
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/7347
https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf
_version_ 1770576316631875584