Identity-Based Identification Schemes from ID-KEMs

  • Prateek Barapatre
  • Chandrasekaran Pandu Rangan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8204)


Identity-based identification(IBI) schemes are means to achieve entity identification in the identity-based setting in a secure fashion. Quite a large number of IBI schemes exist, but, there is still a need for more efficient(in terms of computation and communication) IBI schemes, especially in domains like mobile devices and smart cards. We propose a generic framework for constructing an IBI scheme from an Identity-Based Key Encapsulation Mechanism(ID-KEM) which is semantically secure against adaptive chosen ciphertext attack on one-wayness(OW-CCA2). The derived IBI scheme will be secure against impersonation under active and concurrent attacks. This framework if applied to ID-KEM can lead to more efficient IBI scheme, as opposed to an IBI scheme developed from scratch, depending on the underlying ID-KEM used. Additionally, we propose a new concrete and efficient IBI scheme secure against concurrent attack based on the q-BDHI hard problem assumption.


Identity-based cryptography Identity-based identification Key encapsulation mechanism q-Bilinear Diffie-Hellman inversion Random oracle model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, STOC 1985, pp. 291–304. ACM, New York (1985)CrossRefGoogle Scholar
  2. 2.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Anada, H., Arita, S.: Identification schemes from key encapsulation mechanisms. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 59–76. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    Fiat, A., Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems, pp. 186–194. Springer (1987)Google Scholar
  5. 5.
    Guillou, L.C., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)CrossRefGoogle Scholar
  6. 6.
    Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. J. Cryptol. 22(1), 1–61 (2008)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Chin, J.-J., Heng, S.-H., Goi, B.-M.: An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 60–73. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. J. Cryptology 17(4), 297–319 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Kurosawa, K., Heng, S.-H.: From Digital Signature to ID-based Identification/Signature. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 248–261. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Cheng, Z.: Simple SK-ID-KEM1 (2005)Google Scholar
  13. 13.
    Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic Constructions of Identity-Based and Certificateless KEMs. J. Cryptol. 21(2), 178–199 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Chen, L., Cheng, Z., Smart, N.P., Road, F.: An Efficient ID-KEM based on the Sakai-Kasahara key construction. In: IEE Proceedings of Information Security (2006)Google Scholar
  15. 15.
    Kurosawa, K., Heng, S.-H.: Identity-Based Identification Without Random Oracles. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 603–613. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Prateek Barapatre
    • 1
  • Chandrasekaran Pandu Rangan
    • 1
  1. 1.Theoretical Computer Science Lab., Department of Computer Science and EngineeringIIT MadrasChennaiIndia

Personalised recommendations