Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 237514, 9 pages
http://dx.doi.org/10.1155/2015/237514
Research Article

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

1Faculty of Engineering, Multimedia University, 63000 Cyberjaya, Selangor, Malaysia
2Faculty of Information Science and Technology, Multimedia University, 75450 Melaka, Malaysia

Received 30 April 2014; Revised 9 September 2014; Accepted 10 September 2014

Academic Editor: Jong-Hyuk Park

Copyright © 2015 Ji-Jian Chin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in Proceedings of the Advances in Cryptology (CRYPTO '86), pp. 186–194, 1986.
  2. C.-P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol. 4, no. 3, pp. 161–174, 1991. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” in Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 268–286, Springer, Berlin, Germany, 2004. View at Google Scholar
  5. K. Kurosawa and S.-H. Heng, “From digital signature to ID-based identification/signature,” in Public Key Cryptography—PKC 2004, pp. 248–261, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  6. S.-H. Heng, Design and analysis of some cryptographic primitives [Ph.D. thesis], Graduate School of Science and Engineering, Tokyo Institute of Technology, 2004.
  7. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, 1985. View at Google Scholar
  8. S.-Y. Tan, S.-H. Heng, C.-W. Raphael, and B.-M. Goi, “A variant of Schnorr identity-based identification scheme with tight reduction,” in Future Generation Information Technology, pp. 361–370, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  9. S.-Y. Tan, S.-H. Heng, and B.-M. Goi, “Java implementation for pairing-based cryptosystems,” in Proceedings of the International Conference on Computational Science and Its Applications (ICCSA '10), vol. 6019 of Lecture Notes in Computer Science, pp. 188–198, Springer, Berlin, Germany. View at Publisher · View at Google Scholar
  10. M. Bellare and A. Palacio, “Adriana palacio: GQ and Schnorr identification schemes,” in Proceedings of the 22nd Annual International Cryptology Conference, pp. 162–177, Santa Barbara, Calif, USA, 2002.
  11. H. Luo and M.-L. Shyu, “Quality of service provision in mobile multimedia—a survey,” Human-Centric Computing and Information Sciences, vol. 1, article 5, 2011. View at Google Scholar
  12. P. S. Kim, “An architecture for home-oriented IPTV service platform on residential gateway,” Journal of Information Processing Systems, vol. 9, no. 3, pp. 425–434, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. R. M. Ijtihadie, B. C. Hidayanto, A. Affandi, Y. Chisaki, and T. Usagawa, “Dynamic content synchronization between learning management systems over limited bandwidth network,” Human-Centric Computing and Information Sciences, vol. 2, no. 1, article 17, 2013. View at Publisher · View at Google Scholar
  14. D. Lee and P. Brusilovsky, “Proactive: comprehensive access to job information,” Journal of Information Processing Systems, vol. 8, no. 4, pp. 721–738, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-P. Cheong, S. Fong, P. Lei, C. Chatwin, and R. Young, “Designing an efficient and secure credit card-based payment system with web services based on the ANSI X9.59-2006,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 495–520, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. H.-J. Seo and Y.-C. Choy, “ID credit scoring system based on application scoring system: conceptual online ID credit for ID integrated environment,” Journal of Convergence, vol. 5, no. 1, pp. 38–42, 2014. View at Google Scholar
  17. A. J. Berena, S. Chunwijitra, H. Okada, and H. Ueno, “Shared virtual presentation board for e-meeting in higher education on the WebELS platform,” Human-Centric Computing and Information Sciences, vol. 3, no. 1, article 6, 2013. View at Publisher · View at Google Scholar
  18. M. W. Martin, T. K. Shih, and J. C. Hung, “A personal tutoring mechanism based on the cloud environment,” Journal of Convergence, vol. 4, no. 3, pp. 37–44, 2013. View at Google Scholar
  19. H. Cho and M. Choi, “Personal mobile album/diary application development,” Journal of Convergence, vol. 5, no. 1, pp. 32–37, 2014. View at Google Scholar