A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity
dc.contributor.author | Chin, J-J | |
dc.contributor.author | Kannan, R | |
dc.contributor.author | Goh, V-T | |
dc.contributor.author | Yip, S-C | |
dc.date.accessioned | 2023-12-14T19:58:25Z | |
dc.date.available | 2023-12-14T19:58:25Z | |
dc.date.issued | 2023-12-14 | |
dc.identifier.issn | 1823-8343 | |
dc.identifier.issn | 1823-8343 | |
dc.identifier.uri | https://pearl.plymouth.ac.uk/handle/10026.1/21795 | |
dc.description.abstract |
In this paper, we propose a Blind Identity-Based Identification (Blind IBI) scheme based on the Guillou-Quisquater (GQ) scheme. Our proposed scheme combines the benefits of traditional Identity-Based Identification (IBI) schemes that can authenticate a user’s identity without rely ing on a trusted third party with the Blind Signature (BS) scheme that provides anonymity. As a result, the proposed scheme assures absolute user privacy during the authentication process. It does not rely on a third party, yet the verifier can still be assured of the user’s identity with out the user actually revealing it. In our work, we show that the proposed scheme is provably secure under the random oracle model, with the assumption that the one-more-RSA-inversion problem is difficult. Furthermore, we demonstrate that the proposed scheme is secure against passive, active, and concurrent impersonation attacks. In conclusion, the proposed scheme is able to achieve the desired blindness property without compromising the security of the GQ-IBI scheme it is based upon. | |
dc.format.extent | 19-31 | |
dc.language | en | |
dc.publisher | Pertanika Press | |
dc.subject | blind GQ-IBI | |
dc.subject | blind signature | |
dc.subject | IBI | |
dc.subject | one-more-RSA inversion problem | |
dc.subject | random oracle model | |
dc.title | A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity | |
dc.type | journal-article | |
dc.type | Article | |
plymouth.issue | 4 | |
plymouth.volume | 17 | |
plymouth.publisher-url | https://mjms.upm.edu.my/ | |
plymouth.publication-status | Published online | |
plymouth.journal | Malaysian Journal of Mathematical Sciences | |
dc.identifier.doi | 10.47836/mjms.17.4.11 | |
plymouth.organisational-group | |Plymouth | |
plymouth.organisational-group | |Plymouth|Faculty of Science and Engineering | |
plymouth.organisational-group | |Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | |Plymouth|REF 2021 Researchers by UoA | |
plymouth.organisational-group | |Plymouth|Users by role | |
plymouth.organisational-group | |Plymouth|Users by role|Academics | |
plymouth.organisational-group | |Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics | |
plymouth.organisational-group | |Plymouth|REF 2028 Researchers by UoA | |
plymouth.organisational-group | |Plymouth|REF 2028 Researchers by UoA|UoA11 Computer Science and Informatics | |
dcterms.dateAccepted | 2023-10-04 | |
dc.date.updated | 2023-12-14T19:58:24Z | |
dc.rights.embargodate | 2023-12-16 | |
dc.identifier.eissn | 1823-8343 | |
rioxxterms.version | Accepted Manuscript | |
rioxxterms.versionofrecord | 10.47836/mjms.17.4.11 |