Skip to main content
placeholder image

Identity based identification from algebraic coding theory

Journal Article


Download full-text (Open Access)

Abstract


  • Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks.

Authors


  •   Yang, Guomin
  •   Tan, Chik How. (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Wong, Duncan S. (external author)

Publication Date


  • 2014

Citation


  • Yang, G., Tan, C. How., Mu, Y., Susilo, W. & Wong, D. S. (2014). Identity based identification from algebraic coding theory. Theoretical Computer Science, 520 51-61.

Scopus Eid


  • 2-s2.0-84891959687

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2906&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1897

Has Global Citation Frequency


Number Of Pages


  • 10

Start Page


  • 51

End Page


  • 61

Volume


  • 520

Place Of Publication


  • Netherlands

Abstract


  • Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois–Finiasz–Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks.

Authors


  •   Yang, Guomin
  •   Tan, Chik How. (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Wong, Duncan S. (external author)

Publication Date


  • 2014

Citation


  • Yang, G., Tan, C. How., Mu, Y., Susilo, W. & Wong, D. S. (2014). Identity based identification from algebraic coding theory. Theoretical Computer Science, 520 51-61.

Scopus Eid


  • 2-s2.0-84891959687

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2906&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1897

Has Global Citation Frequency


Number Of Pages


  • 10

Start Page


  • 51

End Page


  • 61

Volume


  • 520

Place Of Publication


  • Netherlands