References
- K. Kurosawa, S.-H. Heng, "From digital signature to id-based identification/signature," Public Key Cryptography, Vol. 2947 of Lecture Notes in Computer Science, Springer, pp. 248-261, 2004.
- M. Bellare, C. Namprempre, G. Neven, "Security proofs for identity-based identification and signature schemes," EUROCRYPT, Vol. 3027 of Lecture Notes in Computer Science, Springer, pp. 268-286, 2004.
- A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPTO, Vol. 196 of Lecture Notes in Computer Science, Springer, pp. 47-53, 1984.
- M. Bellare, P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. of ACM Conference on Computer and Communications Security, ACM, pp. 62-73, 1993.
- R. Canetti, O. Goldreich, S. Halevi, "The random oracle methodology, revised" Journal of ACM, vol. 51, no.4, pp.557-594,2004 https://doi.org/10.1145/1008731.1008734
- K. Kurosawa, S.-H. Heng, "Identity-based identification without random oracles," ICCSA, Vol. 3481 of Lecture Notes in Computer Science, Springer, pp. 603-613, 2005.
- K. Kurosawa, S.-H. Heng, The power of identification schemes," Public Key Cryptography, Vol. 3958 of Lecture Notes in Computer Science, Springer, pp. 364-377, 2006.
- J.-J. Chin, S.-H. Heng, B.-M. Goi, "An efficient and provable secure identity-based identification scheme in the standard model," EuroPKI, Vol. 5057 of Lecture Notes in Computer Science, Springer, pp. 60-73, 2008.
- D. Naccache, "Secure and practical identity-based encryption," IACR Cryptology ePrint Archive, 2005 (2005) 369.
- S. Chatterjee, P. Sarkar, "Trading time for space: Towards an efficient ibe scheme with short(er) public parameters in the standard model," ICISC, Vol. 3935 of Lecture Notes in Computer Science, Springer, pp. 424-440, 2005.
- A. Boldyreva, "Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme," Public Key Cryptography, Vol. 2567 of Lecture Notes in Computer Science, Springer, pp. 31-46, 2003.
- M. Bellare, A. Palacio, "GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks," CRYPTO, Vol. 2442 of Lecture Notes in Computer Science, Springer, pp. 162-177, 2002.
- S.Y. Tan, S.H. Heng, B.M. Goi "Java implementation for pairing-based cryptosystems," ICCSA, Vol. Part IV, Springer, pp. 188-198, 2010.
Cited by
- An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model vol.8, pp.7, 2014, https://doi.org/10.3837/tiis.2014.07.019