Advertisement

Security Enhancement of Identity-Based Identification with Reversibility

  • Atsushi Fujioka
  • Taiichi Saito
  • Keita Xagawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7618)

Abstract

In this paper, we discuss security enhancement for a natural class of identity-based identification (IBI) protocols.

We first introduce reversible Σ-type IBI protocol, which is an extension of reversible identification protocol by Kurosawa and Heng.

We next propose a transformations from a reversible IBI protocol secure against static-identity and passive attacks to another one secure against adaptive-identity and (active and) concurrent attacks. The transformation requires no other cryptographic primitives and no additional number-theoretic assumptions, and the security proof is accomplished without the random oracles.

Keywords

identity-based identification reversible Σ-type identification impersonation under active and concurrent attacks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164–180. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. Journal of Cryptology 22(1), 1–61 (2009); A preliminary version appeared in EUROCRYPT 2004 (2004) MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Bellare, M., Palacio, A.: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 162–177. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Rogaway, P.: Random oracle are practical: A paradigm for designing efficient protocols. In: CCS 1993, pp. 62–73. ACM (1993)Google Scholar
  5. 5.
    Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61–85. Springer, Heidelberg (2007), http://eprint.iacr.org/2006/432 CrossRefGoogle Scholar
  6. 6.
    Cramer, R.: Modular Design of Secure, yet Practical Cryptographic Protocols. PhD thesis, University of Amsterdam (1996)Google Scholar
  7. 7.
    Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC 1990, pp. 416–426. ACM (1990)Google Scholar
  8. 8.
    Fujioka, A., Saito, T., Xagawa, K.: Security Enhancements by OR-Proof in Identity-Based Identification. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 135–152. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  9. 9.
    Gennaro, R.: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 220–236. Springer, Heidelberg (2004)Google Scholar
  10. 10.
    Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS 2000, pp. 143–154. Internet Society (2000)Google Scholar
  11. 11.
    Kurosawa, K., Heng, S.-H.: From Digital Signature to ID-based Identification/Signature. In: Bao, F., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 248–261. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Kurosawa, K., Heng, S.-H.: The power of identification schemes. International Journal of Applied Cryptography (IJACT) 1(1), 60–69 (2008); A preliminary version appeared in PKC 2006 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  13. 13.
    MacKenzie, P., Yang, K.: On Simulation-Sound Trapdoor Commitments. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 382–400. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Rückert, M.: Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 345–362. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  16. 16.
    Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  17. 17.
    Yang, G., Chen, J., Wong, D.S., Deng, X., Wang, D.: A new framework for the design and analysis of identity-based identification schemes. Theoretical Computer Science 407(1-3), 370–388 (2008); A preliminary version appeared ACNS 2007 (2007)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Atsushi Fujioka
    • 1
  • Taiichi Saito
    • 2
  • Keita Xagawa
    • 1
  1. 1.NTT Secure Platform LaboratoriesMusashino-shiJapan
  2. 2.Tokyo Denki UniversityAdachi-kuJapan

Personalised recommendations