Satoshi Hada
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these is a framework that on the one hand helps explain how these schemes are derived and on the other hand enables modular security analyses, thereby helping to understand, simplify, and unify previous work. We also analyze a generic folklore construction that in particular yields identity-based identification and signature schemes without random oracles. © 2008 International Association for Cryptologic Research.
Satoshi Hada
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Mario Blaum, John L. Fan, et al.
IEEE International Symposium on Information Theory - Proceedings
Robert Manson Sawko, Malgorzata Zimon
SIAM/ASA JUQ
Ziv Bar-Yossef, T.S. Jayram, et al.
Journal of Computer and System Sciences