Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
DOI10.1007/S12095-015-0162-5zbMATH Open1372.94417OpenAlexW2204216670MaRDI QIDQ301642FDOQ301642
Authors: Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan
Publication date: 1 July 2016
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-015-0162-5
Recommendations
- On the security of a modified Beth identity-based identification scheme
- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
- Reset-secure identity-based identification schemes without pairings
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- A More Natural Way to Construct Identity-Based Identification Schemes
identificationdiscrete logarithmprovable securityactive/concurrent securityBeth-IBIidentity-basedpairing-free
Cites Work
- Identity-based cryptosystems and signature schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- On the security of a modified Beth identity-based identification scheme
- Title not available (Why is that?)
- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
- Public Key Cryptography – PKC 2004
Cited In (3)
This page was built for publication: Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q301642)