An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme

被引:2
|
作者
Chin, Ji-Jian [1 ]
Behnia, Rouzbeh [2 ,3 ]
Heng, Swee-Huay [2 ,3 ]
Phan, Raphael C. -W. [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
[2] Technol Multimedia Univ, Melaka, Malaysia
[3] Fac Informat Sci, Melaka, Malaysia
来源
2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2013年
关键词
security mediator; instant revocation; identity-based identification; provable security; SIGNATURE; PROOFS;
D O I
10.1109/ASIAJCIS.2013.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In USENIX 2001, Boneh et al. introduced a new way of obtaining fast revocation for RSA keys with the help of a security mediator. In 2003, Boneh et al. also showed how to convert the security-mediated RSA encryption scheme into an identity-based mediated RSA encryption scheme. This new technique addressed the shortcoming of identity-based cryptography where revocation required appending the valid date for a user's keys together with his identity-string, allowing for instant revocation of invalid user keys. Subsequently, many security-mediated cryptographic primitives were proposed. Surprisingly however, no work has yet to be done to address security-mediated identity-based identification schemes despite more than a decade has passed since this feature was incorporated into encryption and signature primitives. In this paper, we provide that contribution by defining the appropriate security notions for achieving fast revocation for identity-based identification schemes. Subsequently we show a concrete scheme that achieves these security notions under provable security.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [11] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [12] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Xiong Hu
    Chen YaNan
    Zhu GuoBin
    Qin ZhiGuang
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 5
  • [13] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Hu Xiong
    YaNan Chen
    GuoBin Zhu
    ZhiGuang Qin
    Science China Information Sciences, 2014, 57 : 1 - 5
  • [14] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    XIONG Hu
    CHEN YaNan
    ZHU GuoBin
    QIN ZhiGuang
    ScienceChina(InformationSciences), 2014, 57 (09) : 156 - 160
  • [15] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [16] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    AIP ADVANCES, 2024, 14 (06)
  • [17] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [18] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [19] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [20] Identity-based key management scheme with provable security for wireless sensor networks
    Zhou, Nanrun
    Jiang, Qiongxi
    Chen, Xun
    Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081