An Efficient and Provably Secure Certificateless Identification Scheme

Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng

2013

Abstract

Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user’s secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.

Download


Paper Citation


in Harvard Style

Chin J., C.-W. Phan R., Behnia R. and Heng S. (2013). An Efficient and Provably Secure Certificateless Identification Scheme . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 371-378. DOI: 10.5220/0004526303710378

in Bibtex Style

@conference{secrypt13,
author={Ji-Jian Chin and Raphael C.-W. Phan and Rouzbeh Behnia and Swee-Huay Heng},
title={An Efficient and Provably Secure Certificateless Identification Scheme},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={371-378},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526303710378},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - An Efficient and Provably Secure Certificateless Identification Scheme
SN - 978-989-8565-73-0
AU - Chin J.
AU - C.-W. Phan R.
AU - Behnia R.
AU - Heng S.
PY - 2013
SP - 371
EP - 378
DO - 10.5220/0004526303710378