Please use this identifier to cite or link to this item: https://doi.org/10.1016/j.tcs.2013.09.008
DC FieldValue
dc.titleIdentity based identification from algebraic coding theory
dc.contributor.authorYang, G.
dc.contributor.authorTan, C.H.
dc.contributor.authorMu, Y.
dc.contributor.authorSusilo, W.
dc.contributor.authorWong, D.S.
dc.date.accessioned2014-12-12T08:00:48Z
dc.date.available2014-12-12T08:00:48Z
dc.date.issued2014-02-06
dc.identifier.citationYang, G., Tan, C.H., Mu, Y., Susilo, W., Wong, D.S. (2014-02-06). Identity based identification from algebraic coding theory. Theoretical Computer Science 520 : 51-61. ScholarBank@NUS Repository. https://doi.org/10.1016/j.tcs.2013.09.008
dc.identifier.issn03043975
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/117042
dc.description.abstractCryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is secure under passive attacks. In this paper, we prove that the scheme in fact can resist active attacks. However, whether the scheme can be proven secure under concurrent attacks (the most powerful attacks against identification schemes) remains open. In addition, we show that it is difficult to apply the conventional OR-proof approach to this particular IBI scheme in order to obtain concurrent security. We then construct a special OR-proof variant of this scheme and prove that the resulting IBI scheme is secure under concurrent attacks. © 2013 Elsevier B.V.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/j.tcs.2013.09.008
dc.sourceScopus
dc.subjectError-correcting codes
dc.subjectIdentification
dc.subjectIdentity based cryptography
dc.subjectSyndrome decoding
dc.typeArticle
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.1016/j.tcs.2013.09.008
dc.description.sourcetitleTheoretical Computer Science
dc.description.volume520
dc.description.page51-61
dc.description.codenTCSCD
dc.identifier.isiut000331432800005
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.