A new framework for the design and analysis of identity-based identification schemes
From MaRDI portal
Publication:955014
DOI10.1016/J.TCS.2008.07.001zbMath1152.68016OpenAlexW2069351704MaRDI QIDQ955014
Jing Chen, Duncan S. Wong, Guomin Yang, Dong-Sheng Wang, Xiaotie Deng
Publication date: 18 November 2008
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2008.07.001
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Identity based identification from algebraic coding theory ⋮ OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss
Uses Software
Cites Work
- Probabilistic encryption
- Identity-Based Cryptosystems and Signature Schemes
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A modification of the RSA public-key encryption procedure (Corresp.)
- Coin flipping by telephone a protocol for solving impossible problems
- Foundations of Cryptography
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Cryptography and Coding
- Public Key Cryptography – PKC 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A new framework for the design and analysis of identity-based identification schemes