Reset-Secure Identity-Based Identification Schemes Without Pairings

Identity-based identification IBI schemes are generally insecure against reset attacks since they are commonly constructed from three-move $$\varSigma $$-protocols similar those of traditional public-key identification schemes. In 2009, Thorncharoensri et al. proposed the first IBI scheme secure against impersonators who are able to perform concurrent-reset attacks and is the only scheme that satisfies this notion of security in literature to date. However, their scheme suffers from correctness issues and is also constructed using pairings, which are known to be costly operationally. In this paper, we utilize one of Bellare et al's methods to reinforce the Schnorr-IBI scheme and also its more-secure variant: the Twin-Schnorr-IBI scheme against reset attacks, therefore achieving reset-secure IBI schemes without pairings.

[1]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Marc Fischlin,et al.  Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.

[4]  Kaoru Kurosawa,et al.  From Digital Signature to ID-based Identification/Signature , 2004, Public Key Cryptography.

[5]  Mihir Bellare,et al.  GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[8]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.

[9]  Kaoru Kurosawa,et al.  Identity-Based Identification Without Random Oracles , 2005, ICCSA.

[10]  Ji-Jian Chin,et al.  Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme , 2015, TheScientificWorldJournal.

[11]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[12]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[13]  Yi Mu,et al.  Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles , 2009, WISA.