A new framework for the design and analysis of identity-based identification schemes
Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed identity of the prover and some public informati...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7400 https://ink.library.smu.edu.sg/context/sis_research/article/8403/viewcontent/a_new_framework.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8403 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84032022-10-13T07:16:55Z A new framework for the design and analysis of identity-based identification schemes YANG, Guomin CHEN, Jing WONG, Duncan S. DENG, Xiaotie WANG, Dongsheng Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed identity of the prover and some public information. In this paper, we propose a new framework for both the design and analysis of IBI schemes. Our approach works in an engineering way. We first identify an IBI scheme as the composition of two building blocks, and then show that, with different security properties of these building blocks, the corresponding IBI schemes can achieve security against impersonation under different levels of attacks, namely, passive attack (id-imp-pa), active attack (id-imp-aa) or concurrent attack (id-imp-ca). In particular, we show that an id-imp-pa secure IBI scheme can be built if there exists a trapdoor weak-one-more relation and an honest verifier zero-knowledge proof with special soundness, while an id-imp-aa and id-imp-ca secure IBI scheme can be built if there exists a trapdoor strong-one-more relation and a Witness Dualism proof with Special Soundness (WD-SS). This new framework can capture IBI construction techniques that are not captured by other known frameworks. It also helps to construct new and efficient schemes. We demonstrate this by proposing two new IBI schemes, one achieving id-imp-pa, and the other one achieving both id-imp-aa and id-imp-ca, and neither of them can be captured by existing frameworks. 2008-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7400 info:doi/10.1016/j.tcs.2008.07.001 https://ink.library.smu.edu.sg/context/sis_research/article/8403/viewcontent/a_new_framework.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based cryptography Identification scheme Passive attack Active attack Concurrent attack Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Identity-based cryptography Identification scheme Passive attack Active attack Concurrent attack Information Security |
spellingShingle |
Identity-based cryptography Identification scheme Passive attack Active attack Concurrent attack Information Security YANG, Guomin CHEN, Jing WONG, Duncan S. DENG, Xiaotie WANG, Dongsheng A new framework for the design and analysis of identity-based identification schemes |
description |
Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed identity of the prover and some public information. In this paper, we propose a new framework for both the design and analysis of IBI schemes. Our approach works in an engineering way. We first identify an IBI scheme as the composition of two building blocks, and then show that, with different security properties of these building blocks, the corresponding IBI schemes can achieve security against impersonation under different levels of attacks, namely, passive attack (id-imp-pa), active attack (id-imp-aa) or concurrent attack (id-imp-ca). In particular, we show that an id-imp-pa secure IBI scheme can be built if there exists a trapdoor weak-one-more relation and an honest verifier zero-knowledge proof with special soundness, while an id-imp-aa and id-imp-ca secure IBI scheme can be built if there exists a trapdoor strong-one-more relation and a Witness Dualism proof with Special Soundness (WD-SS). This new framework can capture IBI construction techniques that are not captured by other known frameworks. It also helps to construct new and efficient schemes. We demonstrate this by proposing two new IBI schemes, one achieving id-imp-pa, and the other one achieving both id-imp-aa and id-imp-ca, and neither of them can be captured by existing frameworks. |
format |
text |
author |
YANG, Guomin CHEN, Jing WONG, Duncan S. DENG, Xiaotie WANG, Dongsheng |
author_facet |
YANG, Guomin CHEN, Jing WONG, Duncan S. DENG, Xiaotie WANG, Dongsheng |
author_sort |
YANG, Guomin |
title |
A new framework for the design and analysis of identity-based identification schemes |
title_short |
A new framework for the design and analysis of identity-based identification schemes |
title_full |
A new framework for the design and analysis of identity-based identification schemes |
title_fullStr |
A new framework for the design and analysis of identity-based identification schemes |
title_full_unstemmed |
A new framework for the design and analysis of identity-based identification schemes |
title_sort |
new framework for the design and analysis of identity-based identification schemes |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2008 |
url |
https://ink.library.smu.edu.sg/sis_research/7400 https://ink.library.smu.edu.sg/context/sis_research/article/8403/viewcontent/a_new_framework.pdf |
_version_ |
1770576331988271104 |