Design and analysis of identification schemes without certificates

This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using h...

Full description

Saved in:
Bibliographic Details
Main Author: Chin, Ji Jian
Format: Thesis
Published: 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-mmu-ep.6236
record_format uketd_dc
spelling my-mmu-ep.62362016-01-11T10:56:13Z Design and analysis of identification schemes without certificates 2014-08 Chin, Ji Jian QA75.5-76.95 Electronic computers. Computer science This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using his identity-string. The section of the thesis begins with a review of Crescenzo’s attempt to tackle Bellare et al.’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result showing that Crescenzo’s solution is flawed. An alternative solution is presented to achieve security against active/concurrent attackers with even better security guarantee using the discrete logarithm assumption instead of its one-more counterpart. Furthermore, this technique is extended to Schnorr’s IBI scheme as well, resulting in two schemes provable secure in the random oracle model. 2014-08 Thesis http://shdl.mmu.edu.my/6236/ http://library.mmu.edu.my/diglib/onlinedb/dig_lib.php phd doctoral Multimedia University Faculty of Information Science and Technology
institution Multimedia University
collection MMU Institutional Repository
topic QA75.5-76.95 Electronic computers
Computer science
spellingShingle QA75.5-76.95 Electronic computers
Computer science
Chin, Ji Jian
Design and analysis of identification schemes without certificates
description This thesis contributes to the study and advancement in the area of identification protocols without certificates. The contributions can be categorised into two main areas. Firstly, this work delves into advancing identity-based identification (IBI), where a user can implicitly certify himself using his identity-string. The section of the thesis begins with a review of Crescenzo’s attempt to tackle Bellare et al.’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result showing that Crescenzo’s solution is flawed. An alternative solution is presented to achieve security against active/concurrent attackers with even better security guarantee using the discrete logarithm assumption instead of its one-more counterpart. Furthermore, this technique is extended to Schnorr’s IBI scheme as well, resulting in two schemes provable secure in the random oracle model.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Chin, Ji Jian
author_facet Chin, Ji Jian
author_sort Chin, Ji Jian
title Design and analysis of identification schemes without certificates
title_short Design and analysis of identification schemes without certificates
title_full Design and analysis of identification schemes without certificates
title_fullStr Design and analysis of identification schemes without certificates
title_full_unstemmed Design and analysis of identification schemes without certificates
title_sort design and analysis of identification schemes without certificates
granting_institution Multimedia University
granting_department Faculty of Information Science and Technology
publishDate 2014
_version_ 1747829609438642176