An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries
Identification schemes are used by machines to securely authenticate the identity of other machines or their users over computer networks. As conventional public key schemes require a trusted third party (TTP) or a public file to ensure the corresponding public key matches with the identity, identit...
Main Authors: | Jason Chia, Ji-Jian Chin |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9049156/ |
Similar Items
-
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
by: Jason Chia, et al.
Published: (2021-07-01) -
Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
by: Azeem Irshad, et al.
Published: (2021-09-01) -
cryptographic Primitives: Insertions, Examples and Open Problems
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01) -
A Shared-Key Security Protocol and Its Flaw
by: Waseem Akhtar Mufti
Published: (2005-06-01) -
Using QKD in MACsec for secure Ethernet networks
by: Joo Yeon Cho, et al.
Published: (2021-09-01)