An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme

被引:2
|
作者
Chin, Ji-Jian [1 ]
Behnia, Rouzbeh [2 ,3 ]
Heng, Swee-Huay [2 ,3 ]
Phan, Raphael C. -W. [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
[2] Technol Multimedia Univ, Melaka, Malaysia
[3] Fac Informat Sci, Melaka, Malaysia
来源
2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2013年
关键词
security mediator; instant revocation; identity-based identification; provable security; SIGNATURE; PROOFS;
D O I
10.1109/ASIAJCIS.2013.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In USENIX 2001, Boneh et al. introduced a new way of obtaining fast revocation for RSA keys with the help of a security mediator. In 2003, Boneh et al. also showed how to convert the security-mediated RSA encryption scheme into an identity-based mediated RSA encryption scheme. This new technique addressed the shortcoming of identity-based cryptography where revocation required appending the valid date for a user's keys together with his identity-string, allowing for instant revocation of invalid user keys. Subsequently, many security-mediated cryptographic primitives were proposed. Surprisingly however, no work has yet to be done to address security-mediated identity-based identification schemes despite more than a decade has passed since this feature was incorporated into encryption and signature primitives. In this paper, we provide that contribution by defining the appropriate security notions for achieving fast revocation for identity-based identification schemes. Subsequently we show a concrete scheme that achieves these security notions under provable security.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [1] Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
    Chin, Ji-Jian
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] An efficient and provable secure identity-based identification scheme in the standard model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Coi, Bok-Min
    PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 60 - +
  • [3] An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 910 - 922
  • [4] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [5] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [6] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [7] A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity
    Kannan, R.
    Chin, J. J.
    Goh, V. T.
    Yip, S. C.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2023, 17 (04): : 705 - 717
  • [8] Comment on "An efficient identity-based signature scheme with provable security"
    Tan, Syh-Yuan
    Heng, Swee-Huay
    INFORMATION SCIENCES, 2024, 659
  • [9] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [10] A provable secure identity-based threshold proxy signcryption scheme
    Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):