Cargando…

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent a...

Descripción completa

Detalles Bibliográficos
Autores principales: Chin, Ji-Jian, Tan, Syh-Yuan, Heng, Swee-Huay, Phan, Raphael Chung-Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4322307/
https://www.ncbi.nlm.nih.gov/pubmed/25692179
http://dx.doi.org/10.1155/2015/237514
_version_ 1782356356745920512
author Chin, Ji-Jian
Tan, Syh-Yuan
Heng, Swee-Huay
Phan, Raphael Chung-Wei
author_facet Chin, Ji-Jian
Tan, Syh-Yuan
Heng, Swee-Huay
Phan, Raphael Chung-Wei
author_sort Chin, Ji-Jian
collection PubMed
description Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes.
format Online
Article
Text
id pubmed-4322307
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-43223072015-02-17 Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme Chin, Ji-Jian Tan, Syh-Yuan Heng, Swee-Huay Phan, Raphael Chung-Wei ScientificWorldJournal Research Article Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. Hindawi Publishing Corporation 2015 2015-01-27 /pmc/articles/PMC4322307/ /pubmed/25692179 http://dx.doi.org/10.1155/2015/237514 Text en Copyright © 2015 Ji-Jian Chin et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Chin, Ji-Jian
Tan, Syh-Yuan
Heng, Swee-Huay
Phan, Raphael Chung-Wei
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title_full Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title_fullStr Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title_full_unstemmed Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title_short Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
title_sort twin-schnorr: a security upgrade for the schnorr identity-based identification scheme
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4322307/
https://www.ncbi.nlm.nih.gov/pubmed/25692179
http://dx.doi.org/10.1155/2015/237514
work_keys_str_mv AT chinjijian twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme
AT tansyhyuan twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme
AT hengsweehuay twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme
AT phanraphaelchungwei twinschnorrasecurityupgradefortheschnorridentitybasedidentificationscheme