Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we show that while the modified version of the Beth identification scheme proposed by Crescenzo is secure, an attack exists on the corresponding ...
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries · Computer Science. IEEE Access · 2020.
Chin, Ji Jian ; Tan, Syh Yuan ; Heng, Swee Huay et al. / On the security of a modified Beth identity-based identification scheme. In: Information Processing ...
on the security of a modified Beth identity-based identification scheme · Information Processing Letters 113(14-16): 580-583 · 2013 · Related Documents · Quick ...
For Creszenso's variant, active and concurrent security for the scheme was thought to be inherited from the modified Beth identification scheme using the ...
People also ask
Abstract. One of the earliest identification schemes was proposed by. Beth in [6]. Since its introduction, variations and generalizations of this.
In this paper, we provide a solution to the open problem, showing that with only some additional overhead to modify the original Beth-IBI scheme we can achieve ...
In this paper we prove that very minor modifications to these schemes result in schemes ... Security proofs for identity-based identification and signature ...
The proof of convertibility of the Beth-SI scheme we surface is in- teresting in that it exploits the existential forgeability of ElGamal signatures. Theorem 7.
This paper provides a solution to the open problem of security under active/concurrent attacks of one of the pairing-free schemes, the Beth-IBI scheme, ...