Identity-Based Identification Schemes from ID-KEMs
Identity-based identification(IBI) schemes are means to achieve entity identification in the identity-based setting in a secure fashion. Quite a large number of IBI schemes exist, but, there is still a need for more efficient(in terms of computation and communication) IBI schemes, especially in domains like mobile devices and smart cards. We propose a generic framework for constructing an IBI scheme from an Identity-Based Key Encapsulation Mechanism(ID-KEM) which is semantically secure against adaptive chosen ciphertext attack on one-wayness(OW-CCA2). The derived IBI scheme will be secure against impersonation under active and concurrent attacks. This framework if applied to ID-KEM can lead to more efficient IBI scheme, as opposed to an IBI scheme developed from scratch, depending on the underlying ID-KEM used. Additionally, we propose a new concrete and efficient IBI scheme secure against concurrent attack based on the q-BDHI hard problem assumption.
KeywordsIdentity-based cryptography Identity-based identification Key encapsulation mechanism q-Bilinear Diffie-Hellman inversion Random oracle model
Unable to display preview. Download preview PDF.
- 4.Fiat, A., Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems, pp. 186–194. Springer (1987)Google Scholar
- 12.Cheng, Z.: Simple SK-ID-KEM1 (2005)Google Scholar
- 14.Chen, L., Cheng, Z., Smart, N.P., Road, F.: An Efficient ID-KEM based on the Sakai-Kasahara key construction. In: IEE Proceedings of Information Security (2006)Google Scholar