Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks
Identification schemes support that a prover who holding a secret key to prove itself to any verifier who holding the corresponding public key. In traditional identity-based identification schemes, there is a key generation center to generate all users’ secret keys. This means that the key generatio...
Main Authors: | Fei Tang, Jiali Bao, Yonghong Huang, Dong Huang, Fuqun Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8820271 |
Similar Items
-
Steganography and Authentication Image Sharing Scheme Without Trusted Third Party
by: Jin-Fwu Ou Yang, et al.
Published: (2011) -
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries
by: Jason Chia, et al.
Published: (2020-01-01) -
A secure spectrum auction scheme without the trusted party based on the smart contract
by: Jiaqi Wang, et al.
Published: (2021-05-01) -
Study on Pseudonym Signature Scheme of Trusted Third Party
by: CHEN Hong, CHEN Honglin, HUANG Jie, XIAO Chenglong, GUO Pengfei, JIN Haibo
Published: (2020-08-01) -
An efficient identification protocol secure against concurrent-reset attacks
by: Wu J., et al.
Published: (2009-12-01)