Hierarchical identity-based identification schemes

14Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hierarchical identity-based cryptography was introduced with the purpose of reducing the burden of a single Private Key Generator (PKG) and to limit damage to only domains whose lower-level PKGs are compromised. However, until now only security models and concrete schemes for hierarchical identity-based encryption and signature schemes are found in literature. In this paper, we propose the initial idea for hierarchical identity-based identification (HIBI) schemes. We provide the formal definition and security model for HIBI schemes and then proceed to propose a concrete HIBI scheme secure against passive attacks in the random oracle model under the Computational Diffie-Hellman assumption. We also prove the HIBI scheme secure against active and concurrent attacks in the random oracle model under the One-More Computational Diffie-Hellman assumption. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chin, J. J., Heng, S. H., & Goi, B. M. (2009). Hierarchical identity-based identification schemes. In Communications in Computer and Information Science (Vol. 58, pp. 93–99). https://doi.org/10.1007/978-3-642-10847-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free