Cargando…
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent a...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4322307/ https://www.ncbi.nlm.nih.gov/pubmed/25692179 http://dx.doi.org/10.1155/2015/237514 |
_version_ | 1782356356745920512 |
---|---|
author | Chin, Ji-Jian Tan, Syh-Yuan Heng, Swee-Huay Phan, Raphael Chung-Wei |
author_facet | Chin, Ji-Jian Tan, Syh-Yuan Heng, Swee-Huay Phan, Raphael Chung-Wei |
author_sort | Chin, Ji-Jian |
collection | PubMed |
description | Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. |
format | Online Article Text |
id | pubmed-4322307 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-43223072015-02-17 Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme Chin, Ji-Jian Tan, Syh-Yuan Heng, Swee-Huay Phan, Raphael Chung-Wei ScientificWorldJournal Research Article Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. Hindawi Publishing Corporation 2015 2015-01-27 /pmc/articles/PMC4322307/ /pubmed/25692179 http://dx.doi.org/10.1155/2015/237514 Text en Copyright © 2015 Ji-Jian Chin et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Chin, Ji-Jian Tan, Syh-Yuan Heng, Swee-Huay Phan, Raphael Chung-Wei Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title | Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title_full | Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title_fullStr | Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title_full_unstemmed | Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title_short | Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme |
title_sort | twin-schnorr: a security upgrade for the schnorr identity-based identification scheme |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4322307/ https://www.ncbi.nlm.nih.gov/pubmed/25692179 http://dx.doi.org/10.1155/2015/237514 |
work_keys_str_mv | AT chinjijian twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme AT tansyhyuan twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme AT hengsweehuay twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme AT phanraphaelchungwei twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme |