Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 170906, 14 pages
http://dx.doi.org/10.1155/2014/170906
Research Article

Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

1Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor, Malaysia
2Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Bukit Beruang, Melaka, Malaysia

Received 13 March 2014; Accepted 17 April 2014; Published 26 May 2014

Academic Editor: Mirjana Ivanovic

Copyright © 2014 Ji-Jian Chin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, G. R. Blakley and D. Chaum, Eds., vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1984. View at Publisher · View at Google Scholar
  2. D. Boneh, X. Ding, G. Tsudik, and C. M. Wong, “A method for fast revocation of public key certificates and security capabilities,” in Proceedings of the 10th Conference on USENIX Security Symposium (SSYM '01), D. S. Wallach, Ed., vol. 10, p. 22, Berkeley, Calif, USA, 2001.
  3. A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in Advances in Cryptology-CRYPTO '86, A. M. Odlyzko, Ed., vol. 263 of Lecture Notes in Computer Science, pp. 186–194, Springer, Berlin, Germany, 1986. View at Publisher · View at Google Scholar
  4. M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” in Advances in Cryptology-EUROCRYPT 2004, C. Cachin and J. Camenisch, Eds., vol. 3027 of Lecture Notes in Computer Science, pp. 268–286, Springer, Berlin, Germany, 2004. View at Google Scholar
  5. K. Kurosawa and S. H. Heng, “From digital signature to ID-based identification/signature,” in Public Key Cryptography-PKC 2004, F. Bao, R. H. Deng, and J. Zhou, Eds., vol. 2947 of Lecture Notes in Computer Science, pp. 248–261, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  6. J. J. Chin, S. H. Heng, and B. M. Goi, “An efficient and provable secure identity-based identification scheme in the standard model,” in Public Key Infrastructure, S. F. Mjølsne, S. Mauw, and S. K. Katsikas, Eds., vol. 5057 of Lecture Notes in Computer Science, pp. 60–73, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  7. J. J. Chin and S. H. Heng, “An adaptive-secure k-resilient identity-based identification scheme in the standard model,” in Proceedings of the FTRA-ACSA Summer, Vancouver, Canada, June 2012.
  8. J. J. Chin, S. H. Heng, and B. M. Goi, “Hierarchical identity-based identification schemes,” in Security Technology, D. Slezak, T. H. Kim, W. C. Fang, and K. P. Arnett, Eds., vol. 58 of Communications in Computer and Information Science, pp. 93–99, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  9. A. Fujioka, T. Saito, and K. Xagawa, “Secure hierarchical identity-based identification without random oracles,” in Information Security, D. Gollmann and F. C. Freiling, Eds., vol. 7483 of Lecture Notes in Computer Science, pp. 258–273, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  10. A. Fujioka, T. Saito, and K. Xagawa, “Applicability of OR-proof techniques to hierarchical identity-based identification,” in Cryptology and Network Security, J. Pieprzyk, A. R. Sadeghi, and M. Manulis, Eds., vol. 7712 of Lecture Notes in Computer Science, pp. 169–184, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  11. J. J. Chin, R. C. W. Phan, R. Behnia, and S. H. Heng, “An efficient and provably secure certificateless identification scheme,” in SECRYPT 2013, P. Samarati, Ed., pp. 371–378, SciTePress, 2013. View at Google Scholar
  12. X. Ding and G. Tsudik, “Simple identity-based cryptography with mediated RSA,” in Topics in Cryptology-CT-RSA 2003, M. Joye, Ed., vol. 2612 of Lecture Notes in Computer Science, pp. 193–210, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  13. B. Libert and J. J. Quisquater, “Efficient revocation and threshold pairing based cryptosystems,” in Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing (PODC '03), E. Borowsky and S. Rajsbaum, Eds., pp. 163–171, ACM, Boston, Mass, USA, July 2003. View at Publisher · View at Google Scholar
  14. X. Cheng, L. Guo, and X. Wang, “An identity-based mediated signature scheme from bilinear pairing,” International Journal of Network Security, vol. 2, no. 1, pp. 29–33, 2006. View at Google Scholar
  15. S. S. M. Chow, C. Boyd, and J. M. G. Nieto, “Security-mediated certificateless cryptography,” in Public Key Cryptography-PKC 2006, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds., vol. 3958 of Lecture Notes in Computer Science, pp. 508–524, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  16. W. S. Yap, S. S. M. Chow, S. H. Heng, and B. M. Goi, “Security mediated certificateless signatures,” in Applied Cryptography and Network Security, J. Katz and M. Yung, Eds., vol. 4521 of Lecture Notes in Computer Science, pp. 459–477, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  17. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology-ASIACRYPT 2003, C.-S. Laih, Ed., vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  18. J. J. Chin, R. Behnia, S. H. Heng, and R. C. W. Phan, “Cryptanalysis of a certificateless identification scheme,” Security and Communication Networks, 2014. View at Publisher · View at Google Scholar
  19. J. J. Chin, R. Behnia, S. H. Heng, and R. C. Phan, “An efficient and provable secure security-mediated identity-based identification scheme,” in Proceedings of the 8th Asia Joint Conference on Information Security (Asia JCIS '13), pp. 27–32, IEEE, Seoul, South Korea, 2013. View at Publisher · View at Google Scholar
  20. M. Bellare and A. Palacio, “GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks,” in Advances in Cryptology-CRYPTO 2002, M. Yung, Ed., vol. 2442 of Lecture Notes in Computer Science, pp. 162–177, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  21. S. Y. Tan, S. H. Heng, R. C. W. Phan, and B. M. Goi, “A variant of Schnorr identity-based identification scheme with tight reduction,” in Future Generation Information Technology, T. H. Kim, H. Adeli, D. Slezak et al., Eds., vol. 7105 of Lecture Notes in Computer Science, pp. 361–370, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  22. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil pairing,” Journal of Cryptology, vol. 17, no. 4, pp. 297–319, 2004. View at Publisher · View at Google Scholar · View at Scopus