Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Oct 20, 2015 · As corollary results, we also introduced the Twin-ElGamal identification scheme and proved it secure against active and concurrent attackers.
In this paper, we provide a solution to the open problem, showing that with only some additional overhead to modify the original Beth-IBI scheme we can achieve ...
This paper provides a solution to the open problem of security under active/concurrent attacks of one of the pairing-free schemes, the Beth-IBI scheme, ...
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Ji Jian Chin*, Syh Yuan Tan, Swee Huay Heng ...
However, the security of both protocols under active and concurrent impersonation attacks was left open. In this paper we prove that very minor modifications to ...
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Article 20 October 2015. Identity-Based Encryption ...
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. 2016, Cryptography and Communications. View full ...
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng ...
In 2004, Bellare et al. formalized the notion for identity-based identification (IBI) schemes and proposed many schemes based on their transformation.
... Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme Cryptography and Communications 8(4): 579-591 · Chia ...