Malaysian Journal of Mathematical Sciences, August 2013, Vol. 7(S)
Special Issue: The 3rd International Conference on Cryptology & Computer Security 2012 (CRYPTOLOGY2012)


Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model

Ji-Jian Chin and Swee-Huay Heng

Corresponding Email: jjchin@mmu.edu.my

Received date: -
Accepted date: -

Abstract:
In 2010, Heng and Chin (2010) proposed an identity-based identification (IBI) scheme in the standard model which was resilient to a coalition of attackers conspiring together to break the scheme. They argued that the scheme was desirable due to its proof in the standard model, which is still rare in the existing literature. Also desirable was that the proposed scheme was designed without bilinear pairings, which costs greatly in terms of operation costs, thereby allowing the scheme to run more efficiently. However, the proof of security for the proposed scheme was only against impersonation under passive attacks, where the adversary is only allowed to eavesdrop on conversations between honest parties during the identification protocol. In this paper, we upgrade the security proof to prove that the scheme is also secure against impersonation under active and concurrent attacks, showing that the scheme is still secure even if the adversary is to interact with honest parties during the attack.

Keywords: Identity-based identification (IBI), identification protocol, security

  



Indexing



















SCImago Journal & Country Rank

Flag Counter