A new framework for the design and analysis of identity-based identification schemes
DOI10.1016/J.TCS.2008.07.001zbMATH Open1152.68016OpenAlexW2069351704MaRDI QIDQ955014FDOQ955014
Authors: Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
Publication date: 18 November 2008
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2008.07.001
Recommendations
- A More Natural Way to Construct Identity-Based Identification Schemes
- Identity-based identification schemes from ID-kems
- Advances in Cryptology - EUROCRYPT 2004
- Security proofs for identity-based identification and signature schemes
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Probabilistic encryption
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Cryptography and Coding
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Foundations of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public Key Cryptography – PKC 2004
- Title not available (Why is that?)
- The complexity of approximating a nonlinear program
- Advances in Cryptology - EUROCRYPT 2004
- Coin flipping by telephone a protocol for solving impossible problems
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- A modification of the RSA public-key encryption procedure (Corresp.)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (7)
- Identity based identification from algebraic coding theory
- Advances in Cryptology - EUROCRYPT 2004
- A More Natural Way to Construct Identity-Based Identification Schemes
- Some remarks on the security of the identification scheme based on permuted kernels
- Reset-secure identity-based identification schemes without pairings
- OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss
- Identity-based identification schemes from ID-kems
Uses Software
This page was built for publication: A new framework for the design and analysis of identity-based identification schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q955014)