An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries
Identification schemes are used by machines to securely authenticate the identity of other machines or their users over computer networks. As conventional public key schemes require a trusted third party (TTP) or a public file to ensure the corresponding public key matches with the identity, identit...
Main Authors: | Jason Chia, Ji-Jian Chin |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9049156/ |
Similar Items
-
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
by: Jason Chia, et al.
Published: (2021-07-01) -
cryptographic Primitives: Insertions, Examples and Open Problems
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01) -
Cryptographic mechanisms for secure interaction of control and measuring devices
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01) -
Identity Management in University System
by: Emanuil REDNIC, et al.
Published: (2008-01-01) -
Modelling and Security Analysis of Authenticated Group Key Agreement Protocols
by: Pereira, Olivier
Published: (2003)