Abstract
In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.
| Original language | English |
|---|---|
| Pages (from-to) | 910-922 |
| Number of pages | 13 |
| Journal | KSII Transactions on Internet and Information Systems |
| Volume | 7 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - 13 Apr 2013 |
| Externally published | Yes |
ASJC Scopus subject areas
- Information Systems
- Computer Networks and Communications
Keywords
- Identity-based identification
- Proof of security
- Standard model