A more natural way to construct identity-based identification schemes

Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a public verifier who knows only the claimed identity of the prover and some common information....

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, CHEN, Jing, WONG, Duncan S., DENG, Xiaotie, WANG, Dongsheng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2007
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7422
https://ink.library.smu.edu.sg/context/sis_research/article/8425/viewcontent/A_more_natural_way_to_construct_identity_based_identification_schemes.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8425
record_format dspace
spelling sg-smu-ink.sis_research-84252023-08-21T06:04:24Z A more natural way to construct identity-based identification schemes YANG, Guomin CHEN, Jing WONG, Duncan S. DENG, Xiaotie WANG, Dongsheng Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a public verifier who knows only the claimed identity of the prover and some common information. In this paper, we propose a simple and efficient framework for constructing IBI schemes. Unlike some related framework which constructs IBI schemes from some standard identification schemes, our framework is based on some more fundamental assumptions on intractable problems. Depending on the features of the underlying intractable problems presumed in our framework, we can derive IBI schemes secure against passive, active and concurrent adversaries. We show that the framework can capture a large class of schemes currently proposed, and also has the potential to cover many newly constructed schemes. As an example, based on the Katz-Wang standard signature scheme, we propose a new IBI scheme that is secure against active adversaries in a concurrent manner. It can be seen that our framework also help simplify the security proofs for new IBI schemes. Finally, and of independent interest, we define a new notion for proof systems called Witness Dualism. This notion is weaker than that of witness indistinguishable and we show that it is enough for constructing an IBI scheme secure against the most powerful type of adversaries defined. 2007-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7422 info:doi/10.1007/978-3-540-72738-5_20 https://ink.library.smu.edu.sg/context/sis_research/article/8425/viewcontent/A_more_natural_way_to_construct_identity_based_identification_schemes.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based cryptography Identification schemes Concurrent attacks Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Identity-based cryptography
Identification schemes
Concurrent attacks
Information Security
spellingShingle Identity-based cryptography
Identification schemes
Concurrent attacks
Information Security
YANG, Guomin
CHEN, Jing
WONG, Duncan S.
DENG, Xiaotie
WANG, Dongsheng
A more natural way to construct identity-based identification schemes
description Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a public verifier who knows only the claimed identity of the prover and some common information. In this paper, we propose a simple and efficient framework for constructing IBI schemes. Unlike some related framework which constructs IBI schemes from some standard identification schemes, our framework is based on some more fundamental assumptions on intractable problems. Depending on the features of the underlying intractable problems presumed in our framework, we can derive IBI schemes secure against passive, active and concurrent adversaries. We show that the framework can capture a large class of schemes currently proposed, and also has the potential to cover many newly constructed schemes. As an example, based on the Katz-Wang standard signature scheme, we propose a new IBI scheme that is secure against active adversaries in a concurrent manner. It can be seen that our framework also help simplify the security proofs for new IBI schemes. Finally, and of independent interest, we define a new notion for proof systems called Witness Dualism. This notion is weaker than that of witness indistinguishable and we show that it is enough for constructing an IBI scheme secure against the most powerful type of adversaries defined.
format text
author YANG, Guomin
CHEN, Jing
WONG, Duncan S.
DENG, Xiaotie
WANG, Dongsheng
author_facet YANG, Guomin
CHEN, Jing
WONG, Duncan S.
DENG, Xiaotie
WANG, Dongsheng
author_sort YANG, Guomin
title A more natural way to construct identity-based identification schemes
title_short A more natural way to construct identity-based identification schemes
title_full A more natural way to construct identity-based identification schemes
title_fullStr A more natural way to construct identity-based identification schemes
title_full_unstemmed A more natural way to construct identity-based identification schemes
title_sort more natural way to construct identity-based identification schemes
publisher Institutional Knowledge at Singapore Management University
publishDate 2007
url https://ink.library.smu.edu.sg/sis_research/7422
https://ink.library.smu.edu.sg/context/sis_research/article/8425/viewcontent/A_more_natural_way_to_construct_identity_based_identification_schemes.pdf
_version_ 1779156899434856448