Security Proofs for Identity-Based Identification and Signature Schemes

Journal of Cryptology(2008)

引用 748|浏览2
暂无评分
摘要
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these is a framework that on the one hand helps explain how these schemes are derived and on the other hand enables modular security analyses, thereby helping to understand, simplify, and unify previous work. We also analyze a generic folklore construction that in particular yields identity-based identification and signature schemes without random oracles.
更多
查看译文
关键词
Identity-based cryptography,Identification schemes,Signatures,Security proofs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要