Security proofs for identity-based identification and signature schemes

Ref: Mihir Bellare, Chanathip Namprempre and Gregory Neven. Journal of Cryptology 22(1), pages 1-61, 2009. An extended abstract of this paper appeared in C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 268-286. Springer-Verlag, 2004.

Abstract: This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these are a framework that on the one hand helps explain how these schemes are derived, and on the other hand enables modular security analyses, thereby helping to understand, simplify and unify previous work.

Postscript | PDF | Powerpoint presentation

Back