Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
From MaRDI portal
Publication:301642
DOI10.1007/S12095-015-0162-5zbMath1372.94417OpenAlexW2204216670MaRDI QIDQ301642
Swee-Huay Heng, Syh-Yuan Tan, Ji-Jian Chin, Raphael C.-W. Phan
Publication date: 1 July 2016
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-015-0162-5
identificationprovable securitydiscrete logarithmactive/concurrent securityBeth-IBIidentity-basedpairing-free
Cites Work
- Unnamed Item
- Unnamed Item
- On the security of a modified Beth identity-based identification scheme
- Identity-Based Cryptosystems and Signature Schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Advances in Cryptology - EUROCRYPT 2004
- On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
- Public Key Cryptography – PKC 2004
This page was built for publication: Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme