Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Nov 28, 2015 · In 2009, Thorncharoensri et al. proposed the first IBI scheme secure against impersonators who are able to perform concurrent-reset attacks and ...
Jan 6, 2024 · In this paper, we utilize one of Bellare et al's methods to reinforce the Schnorr-IBI scheme (and also its more-secure variant: the Twin-Schnorr ...
Reset-Secure Identity-Based Identification Schemes Without Pairings. In Provable Security (Vol. 0, pp. 227-246). Ashgate Publishing Ltd. https://doi.org ...
Identity-based identification (IBI) schemes are generally insecure against reset attacks since they are commonly constructed from three-move.
In this paper, we consider the most stringent attack in identification schemes, namely the reset attacks. The aim of this paper is to present the first identity ...
Our scheme uses no pairings and is able to operate faster than pairing based HIBIs. Keywords: Security attacks, Hierarchical Identity-based identification.
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without ... Reset-Secure Identity-Based Identification Schemes Without Pairings. In ...
This work proposes an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC ...
In this paper, we propose an efficient identity-based identification (IBI) scheme provably secure against impersonation under active and concurrent attacks ...
Abstract. Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves.
Missing: Reset- Identification