Cargando…
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent a...
Autores principales: | Chin, Ji-Jian, Tan, Syh-Yuan, Heng, Swee-Huay, Phan, Raphael Chung-Wei |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4322307/ https://www.ncbi.nlm.nih.gov/pubmed/25692179 http://dx.doi.org/10.1155/2015/237514 |
Ejemplares similares
-
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
por: Muthurajan, Vinothkumar, et al.
Publicado: (2016) -
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
por: Chin, Ji-Jian, et al.
Publicado: (2014) -
A Secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario
por: Shariq, Mohd, et al.
Publicado: (2021) -
Provably secure identity-based identification and signature schemes from code assumptions
por: Song, Bo, et al.
Publicado: (2017) -
Information security practice and experience: 15th international conference, ISPEC 2019, kKuala Lumpur, Malaysia, November 26-28, 2019, proceedings
por: Heng, Swee-Huay, et al.
Publicado: (2019)