An Efficient and Provably Secure Certificateless Identification Scheme
Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng
2013
Abstract
Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user’s secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.
DownloadPaper Citation
in Harvard Style
Chin J., C.-W. Phan R., Behnia R. and Heng S. (2013). An Efficient and Provably Secure Certificateless Identification Scheme . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 371-378. DOI: 10.5220/0004526303710378
in Bibtex Style
@conference{secrypt13,
author={Ji-Jian Chin and Raphael C.-W. Phan and Rouzbeh Behnia and Swee-Huay Heng},
title={An Efficient and Provably Secure Certificateless Identification Scheme},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={371-378},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526303710378},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - An Efficient and Provably Secure Certificateless Identification Scheme
SN - 978-989-8565-73-0
AU - Chin J.
AU - C.-W. Phan R.
AU - Behnia R.
AU - Heng S.
PY - 2013
SP - 371
EP - 378
DO - 10.5220/0004526303710378