Security Enhancement of Identity-Based Identification with Reversibility

  • Atsushi Fujioka
  • Taiichi Saito
  • Keita Xagawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7618)


In this paper, we discuss security enhancement for a natural class of identity-based identification (IBI) protocols.

We first introduce reversible Σ-type IBI protocol, which is an extension of reversible identification protocol by Kurosawa and Heng.

We next propose a transformations from a reversible IBI protocol secure against static-identity and passive attacks to another one secure against adaptive-identity and (active and) concurrent attacks. The transformation requires no other cryptographic primitives and no additional number-theoretic assumptions, and the security proof is accomplished without the random oracles.


identity-based identification reversible Σ-type identification impersonation under active and concurrent attacks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164–180. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. Journal of Cryptology 22(1), 1–61 (2009); A preliminary version appeared in EUROCRYPT 2004 (2004) MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Bellare, M., Palacio, A.: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 162–177. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Rogaway, P.: Random oracle are practical: A paradigm for designing efficient protocols. In: CCS 1993, pp. 62–73. ACM (1993)Google Scholar
  5. 5.
    Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61–85. Springer, Heidelberg (2007), CrossRefGoogle Scholar
  6. 6.
    Cramer, R.: Modular Design of Secure, yet Practical Cryptographic Protocols. PhD thesis, University of Amsterdam (1996)Google Scholar
  7. 7.
    Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC 1990, pp. 416–426. ACM (1990)Google Scholar
  8. 8.
    Fujioka, A., Saito, T., Xagawa, K.: Security Enhancements by OR-Proof in Identity-Based Identification. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 135–152. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  9. 9.
    Gennaro, R.: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 220–236. Springer, Heidelberg (2004)Google Scholar
  10. 10.
    Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS 2000, pp. 143–154. Internet Society (2000)Google Scholar
  11. 11.
    Kurosawa, K., Heng, S.-H.: From Digital Signature to ID-based Identification/Signature. In: Bao, F., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 248–261. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Kurosawa, K., Heng, S.-H.: The power of identification schemes. International Journal of Applied Cryptography (IJACT) 1(1), 60–69 (2008); A preliminary version appeared in PKC 2006 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  13. 13.
    MacKenzie, P., Yang, K.: On Simulation-Sound Trapdoor Commitments. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 382–400. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Rückert, M.: Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 345–362. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  16. 16.
    Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  17. 17.
    Yang, G., Chen, J., Wong, D.S., Deng, X., Wang, D.: A new framework for the design and analysis of identity-based identification schemes. Theoretical Computer Science 407(1-3), 370–388 (2008); A preliminary version appeared ACNS 2007 (2007)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Atsushi Fujioka
    • 1
  • Taiichi Saito
    • 2
  • Keita Xagawa
    • 1
  1. 1.NTT Secure Platform LaboratoriesMusashino-shiJapan
  2. 2.Tokyo Denki UniversityAdachi-kuJapan

Personalised recommendations