Hierarchical identity-based cryptography was introduced with the purpose of reducing the burden of a single Private Key Generator (PKG) and to limit damage to only domains whose lower-level PKGs are compromised. However, until now only security models and concrete schemes for hierarchical identity-based encryption and signature schemes are found in literature. In this paper, we propose the initial idea for hierarchical identity-based identification (HIBI) schemes. We provide the formal definition and security model for HIBI schemes and then proceed to propose a concrete HIBI scheme secure against passive attacks in the random oracle model under the Computational Diffie-Hellman assumption. We also prove the HIBI scheme secure against active and concurrent attacks in the random oracle model under the One-More Computational Diffie-Hellman assumption. © 2009 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Chin, J. J., Heng, S. H., & Goi, B. M. (2009). Hierarchical identity-based identification schemes. In Communications in Computer and Information Science (Vol. 58, pp. 93–99). https://doi.org/10.1007/978-3-642-10847-1_12
Mendeley helps you to discover research relevant for your work.