Design and analysis of identification schemes without certificates
This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using h...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Published: |
2014
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-mmu-ep.6236 |
---|---|
record_format |
uketd_dc |
spelling |
my-mmu-ep.62362016-01-11T10:56:13Z Design and analysis of identification schemes without certificates 2014-08 Chin, Ji Jian QA75.5-76.95 Electronic computers. Computer science This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using his identity-string. The section of the thesis begins with a review of Crescenzo’s attempt to tackle Bellare et al.’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result showing that Crescenzo’s solution is flawed. An alternative solution is presented to achieve security against active/concurrent attackers with even better security guarantee using the discrete logarithm assumption instead of its one-more counterpart. Furthermore, this technique is extended to Schnorr’s IBI scheme as well, resulting in two schemes provable secure in the random oracle model. 2014-08 Thesis http://shdl.mmu.edu.my/6236/ http://library.mmu.edu.my/diglib/onlinedb/dig_lib.php phd doctoral Multimedia University Faculty of Information Science and Technology |
institution |
Multimedia University |
collection |
MMU Institutional Repository |
topic |
QA75.5-76.95 Electronic computers Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers Computer science Chin, Ji Jian Design and analysis of identification schemes without certificates |
description |
This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas.
Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using his identity-string. The section of
the thesis begins with a review of Crescenzo’s attempt to tackle Bellare et al.’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks
and a result showing that Crescenzo’s solution is flawed. An alternative solution is presented to achieve security against active/concurrent attackers with even better
security guarantee using the discrete logarithm assumption instead of its one-more counterpart. Furthermore, this technique is extended to Schnorr’s IBI scheme as well,
resulting in two schemes provable secure in the random oracle model. |
format |
Thesis |
qualification_name |
Doctor of Philosophy (PhD.) |
qualification_level |
Doctorate |
author |
Chin, Ji Jian |
author_facet |
Chin, Ji Jian |
author_sort |
Chin, Ji Jian |
title |
Design and analysis of identification schemes without certificates |
title_short |
Design and analysis of identification schemes without certificates |
title_full |
Design and analysis of identification schemes without certificates |
title_fullStr |
Design and analysis of identification schemes without certificates |
title_full_unstemmed |
Design and analysis of identification schemes without certificates |
title_sort |
design and analysis of identification schemes without certificates |
granting_institution |
Multimedia University |
granting_department |
Faculty of Information Science and Technology |
publishDate |
2014 |
_version_ |
1747829609438642176 |