An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme

被引:2
|
作者
Chin, Ji-Jian [1 ]
Behnia, Rouzbeh [2 ,3 ]
Heng, Swee-Huay [2 ,3 ]
Phan, Raphael C. -W. [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
[2] Technol Multimedia Univ, Melaka, Malaysia
[3] Fac Informat Sci, Melaka, Malaysia
来源
2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2013年
关键词
security mediator; instant revocation; identity-based identification; provable security; SIGNATURE; PROOFS;
D O I
10.1109/ASIAJCIS.2013.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In USENIX 2001, Boneh et al. introduced a new way of obtaining fast revocation for RSA keys with the help of a security mediator. In 2003, Boneh et al. also showed how to convert the security-mediated RSA encryption scheme into an identity-based mediated RSA encryption scheme. This new technique addressed the shortcoming of identity-based cryptography where revocation required appending the valid date for a user's keys together with his identity-string, allowing for instant revocation of invalid user keys. Subsequently, many security-mediated cryptographic primitives were proposed. Surprisingly however, no work has yet to be done to address security-mediated identity-based identification schemes despite more than a decade has passed since this feature was incorporated into encryption and signature primitives. In this paper, we provide that contribution by defining the appropriate security notions for achieving fast revocation for identity-based identification schemes. Subsequently we show a concrete scheme that achieves these security notions under provable security.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 50 条
  • [41] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [42] A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
    Hussain, Saddam
    Ullah, Insaf
    Khattak, Hizbullah
    Khan, Muhammad Asghar
    Chen, Chien-Ming
    Kumari, Saru
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [43] Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
    Zhang, Xiujie
    Fu, Xingbing
    Hong, Lu
    Liu, Yu
    Wang, Liangliang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06):
  • [44] Fuzzy Identity-Based Identification Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    Moon, SangJae
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 123 - +
  • [45] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [46] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [47] Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks
    Dang, Lanjun
    Xu, Jie
    Cao, Xuefei
    Li, Hui
    Chen, Jie
    Zhang, Yueyu
    Fu, Xiaotong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)
  • [48] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [49] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [50] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537