Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user's secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.
|Title of host publication||ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings|
|Number of pages||8|
|Publication status||Published - 2013|
|Event||International Conference on Information Security and Cryptography 2013 - Reykjavik, Iceland|
Duration: 29 Jul 2013 → 31 Jul 2013
Conference number: 10th
|Conference||International Conference on Information Security and Cryptography 2013|
|Abbreviated title||SECRYPT 2013|
|Period||29/07/13 → 31/07/13|
|Other||SECRYPT is part of ICETE, the 10th International Joint Conference on e-Business and Telecommunications.|
Registration to SECRYPT allows free access to all other ICETE conferences.
ICETE 2013 will be held in conjunction with DATA 2013, ICSOFT 2013 and SIMULTECH 2013.
Registration to ICETE allows free access to the DATA, ICSOFT and SIMULTECH conferences (as a non-speaker).
- Identity based
- Provable security
- Without escrow