A variant of Schnorr identity-based identification scheme with tight reduction

Syh Yuan Tan, Swee Huay Heng, Raphael C.W. Phan, Bok Min Goi

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Abstract

Using the rewinding technique from Reset Lemma, Schnorr identity-based identification (IBI) can be proven secure against impersonation under passive attack, and active and concurrent attacks if the discrete logarithm problem and one-more discrete logarithm problem are hard in the random oracle model respectively. However, its security reduction is not tight. In this paper, we propose a variant of Schnorr IBI scheme and provide a direct proof with tight security reduction. In particular, we show that with only three additional elements in the system parameters, the proposed scheme can be proven secure against impersonation under passive attack, and active and concurrent attacks if the decisional Diffie-Hellman problem is hard in the random oracle model. This proving technique may also be applied on other IBI schemes.

Original languageEnglish
Title of host publicationFuture Generation Information Technology - Third International Conference, FGIT 2011, in Conjunction with GDC 2011, Proceedings
Pages361-370
Number of pages10
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventInternational Conference on Signal Processing, Image Processing and Pattern Recognition held at the FGIT Conference 2011 - Jeju Island, Korea, South
Duration: 8 Dec 201110 Dec 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7105 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Signal Processing, Image Processing and Pattern Recognition held at the FGIT Conference 2011
Abbreviated titleSIP 2011
Country/TerritoryKorea, South
CityJeju Island
Period8/12/1110/12/11

Keywords

  • identitification
  • Identity-based
  • tight reduction

Cite this