Skip to main content
placeholder image

A new framework for the design and analysis of identity-based identification schemes

Journal Article


Abstract


  • Constructing an identification scheme is one of the fundamental problems in cryptography,

    and is very useful in practice. An identity-based identification (IBI) scheme allows a prover

    to identify himself to a public verifier who knows only the claimed identity of the prover

    and some public information. In this paper, we propose a new framework for both the

    design and analysis of IBI schemes. Our approach works in an engineering way. We first

    identify an IBI scheme as the composition of two building blocks, and then show that, with

    different security properties of these building blocks, the corresponding IBI schemes can

    achieve security against impersonation under different levels of attacks, namely, passive

    attack (id-imp-pa), active attack (id-imp-aa) or concurrent attack (id-imp-ca). In particular,

    we show that an id-imp-pa secure IBI scheme can be built if there exists a trapdoor weakone-more

    relation and an honest verifier zero-knowledge proof with special soundness,

    while an id-imp-aa and id-imp-ca secure IBI scheme can be built if there exists a trapdoor

    strong-one-more relation and a Witness Dualism proof with Special Soundness (WD-SS). This

    new framework can capture IBI construction techniques that are not captured by other

    known frameworks. It also helps to construct new and efficient schemes. We demonstrate

    this by proposing two new IBI schemes, one achieving id-imp-pa, and the other one

    achieving both id-imp-aa and id-imp-ca, and neither of them can be captured by existing

    frameworks.

Authors


  •   Yang, Guomin
  •   Chen, Jing (external author)
  •   Wong, Duncan S. (external author)
  •   Deng, Xiaotie (external author)
  •   Wang, Dongsheng (external author)

Publication Date


  • 2008

Citation


  • Yang, G., Chen, J., Wong, D. S., Deng, X. & Wang, D. (2008). A new framework for the design and analysis of identity-based identification schemes. Theoretical Computer Science, 407 370-388.

Scopus Eid


  • 2-s2.0-53249115196

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3576

Has Global Citation Frequency


Number Of Pages


  • 18

Start Page


  • 370

End Page


  • 388

Volume


  • 407

Place Of Publication


  • Netherlands

Abstract


  • Constructing an identification scheme is one of the fundamental problems in cryptography,

    and is very useful in practice. An identity-based identification (IBI) scheme allows a prover

    to identify himself to a public verifier who knows only the claimed identity of the prover

    and some public information. In this paper, we propose a new framework for both the

    design and analysis of IBI schemes. Our approach works in an engineering way. We first

    identify an IBI scheme as the composition of two building blocks, and then show that, with

    different security properties of these building blocks, the corresponding IBI schemes can

    achieve security against impersonation under different levels of attacks, namely, passive

    attack (id-imp-pa), active attack (id-imp-aa) or concurrent attack (id-imp-ca). In particular,

    we show that an id-imp-pa secure IBI scheme can be built if there exists a trapdoor weakone-more

    relation and an honest verifier zero-knowledge proof with special soundness,

    while an id-imp-aa and id-imp-ca secure IBI scheme can be built if there exists a trapdoor

    strong-one-more relation and a Witness Dualism proof with Special Soundness (WD-SS). This

    new framework can capture IBI construction techniques that are not captured by other

    known frameworks. It also helps to construct new and efficient schemes. We demonstrate

    this by proposing two new IBI schemes, one achieving id-imp-pa, and the other one

    achieving both id-imp-aa and id-imp-ca, and neither of them can be captured by existing

    frameworks.

Authors


  •   Yang, Guomin
  •   Chen, Jing (external author)
  •   Wong, Duncan S. (external author)
  •   Deng, Xiaotie (external author)
  •   Wang, Dongsheng (external author)

Publication Date


  • 2008

Citation


  • Yang, G., Chen, J., Wong, D. S., Deng, X. & Wang, D. (2008). A new framework for the design and analysis of identity-based identification schemes. Theoretical Computer Science, 407 370-388.

Scopus Eid


  • 2-s2.0-53249115196

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3576

Has Global Citation Frequency


Number Of Pages


  • 18

Start Page


  • 370

End Page


  • 388

Volume


  • 407

Place Of Publication


  • Netherlands