From Digital Signature to ID-based Identification/Signature

作者: Kaoru Kurosawa , Swee-Huay Heng

DOI: 10.1007/978-3-540-24632-9_18

关键词: Merkle signature schemeDiscrete logarithmPublic-key cryptographyIdentification schemeDigital signatureID-based cryptographyDiffie–Hellman problemSchnorr signatureComputer scienceAlgorithmElGamal signature schemeIdentification (information)

摘要: … Hence it is not ID-based, either. Secondly, we show a transformation from a digital signature scheme (DS) to an ID-based identification scheme, where we require that the signature …

参考文章(33)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre, From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security international cryptology conference. ,vol. 2332, pp. 418- 433 ,(2002) , 10.1007/3-540-46035-7_28
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Aggelos Kiayias, Moti Yung, Traitor Tracing with Constant Transmission Rate international cryptology conference. pp. 450- 465 ,(2002) , 10.1007/3-540-46035-7_30
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing international conference on the theory and application of cryptology and information security. pp. 514- 532 ,(2001) , 10.1007/3-540-45682-1_30
Clifford Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues Lecture Notes in Computer Science. pp. 360- 363 ,(2001) , 10.1007/3-540-45325-3_32
Louis C. Guillou, Jean-Jacques Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory theory and application of cryptographic techniques. pp. 123- 128 ,(1988) , 10.1007/3-540-45961-8_11
Uriel Feige, Amos Fiat, Adi Shamir, Zero-knowledge proofs of identity Journal of Cryptology. ,vol. 1, pp. 77- 94 ,(1988) , 10.1007/BF02351717