Efficient identification protocol provably secure in standard model

Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. The new identification protocol is proven secure against impersonation under concurrent reset attack setting in sta...

Full description

Saved in:
Bibliographic Details
Main Authors: LI Yan-ping1, WANG Yu-min1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74654277/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537580631326720
author LI Yan-ping1
WANG Yu-min1
author_facet LI Yan-ping1
WANG Yu-min1
author_sort LI Yan-ping1
collection DOAJ
description Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. Due to its simplicity and naturalness, low-memory, low-computation costs, and better security, the proposed scheme is well suitable for using in computationally limited devices for identification such as smart cards.
format Article
id doaj-art-ecf49b1a50be40a49047ca3b3fd29e8f
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ecf49b1a50be40a49047ca3b3fd29e8f2025-01-14T08:30:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130586174654277Efficient identification protocol provably secure in standard modelLI Yan-ping1WANG Yu-min1Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. Due to its simplicity and naturalness, low-memory, low-computation costs, and better security, the proposed scheme is well suitable for using in computationally limited devices for identification such as smart cards.http://www.joconline.com.cn/zh/article/74654277/identification protocolbilinear pairingstandard model
spellingShingle LI Yan-ping1
WANG Yu-min1
Efficient identification protocol provably secure in standard model
Tongxin xuebao
identification protocol
bilinear pairing
standard model
title Efficient identification protocol provably secure in standard model
title_full Efficient identification protocol provably secure in standard model
title_fullStr Efficient identification protocol provably secure in standard model
title_full_unstemmed Efficient identification protocol provably secure in standard model
title_short Efficient identification protocol provably secure in standard model
title_sort efficient identification protocol provably secure in standard model
topic identification protocol
bilinear pairing
standard model
url http://www.joconline.com.cn/zh/article/74654277/
work_keys_str_mv AT liyanping1 efficientidentificationprotocolprovablysecureinstandardmodel
AT wangyumin1 efficientidentificationprotocolprovablysecureinstandardmodel