An efficient and provably secure certificateless identification scheme

Ji Jian Chin, Raphael C.W. Phan, Rouzbeh Behnia, Swee Huay Heng

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)


Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user's secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.

Original languageEnglish
Title of host publicationICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
Number of pages8
Publication statusPublished - 2013
Externally publishedYes
EventInternational Conference on Information Security and Cryptography 2013 - Reykjavik, Iceland
Duration: 29 Jul 201331 Jul 2013
Conference number: 10th


ConferenceInternational Conference on Information Security and Cryptography 2013
Abbreviated titleSECRYPT 2013
OtherSECRYPT is part of ICETE, the 10th International Joint Conference on e-Business and Telecommunications.
Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2013 will be held in conjunction with DATA 2013, ICSOFT 2013 and SIMULTECH 2013.
Registration to ICETE allows free access to the DATA, ICSOFT and SIMULTECH conferences (as a non-speaker).
Internet address


  • Certificateless
  • Identification
  • Identity based
  • Provable security
  • Without escrow

Cite this