An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme

被引:2
|
作者
Chin, Ji-Jian [1 ]
Behnia, Rouzbeh [2 ,3 ]
Heng, Swee-Huay [2 ,3 ]
Phan, Raphael C. -W. [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
[2] Technol Multimedia Univ, Melaka, Malaysia
[3] Fac Informat Sci, Melaka, Malaysia
来源
2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2013年
关键词
security mediator; instant revocation; identity-based identification; provable security; SIGNATURE; PROOFS;
D O I
10.1109/ASIAJCIS.2013.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In USENIX 2001, Boneh et al. introduced a new way of obtaining fast revocation for RSA keys with the help of a security mediator. In 2003, Boneh et al. also showed how to convert the security-mediated RSA encryption scheme into an identity-based mediated RSA encryption scheme. This new technique addressed the shortcoming of identity-based cryptography where revocation required appending the valid date for a user's keys together with his identity-string, allowing for instant revocation of invalid user keys. Subsequently, many security-mediated cryptographic primitives were proposed. Surprisingly however, no work has yet to be done to address security-mediated identity-based identification schemes despite more than a decade has passed since this feature was incorporated into encryption and signature primitives. In this paper, we provide that contribution by defining the appropriate security notions for achieving fast revocation for identity-based identification schemes. Subsequently we show a concrete scheme that achieves these security notions under provable security.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [31] A provable secure fuzzy identity based signature scheme
    WANG ChangJi 1
    2 Guangdong Province Information Security Key Laboratory
    ScienceChina(InformationSciences), 2012, 55 (09) : 2139 - 2148
  • [32] A provable secure fuzzy identity based signature scheme
    ChangJi Wang
    Science China Information Sciences, 2012, 55 : 2139 - 2148
  • [33] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [34] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [35] An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2532 - 2553
  • [36] A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4576 - 4598
  • [37] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [38] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,
  • [39] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [40] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31