Keyword : identification scheme


Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis
Bagus SANTOSO 
Publication:   
Publication Date: 2018/05/01
Vol. E101-A  No. 5 ; pp. 787-798
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
post-quantum cryptographyIsomorphism of Polynomialsmultivariate cryptographyidentification schemezero knowledge proof
 Summary | Full Text:PDF

Identification Schemes from Key Encapsulation Mechanisms
Hiroaki ANADA Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/07/01
Vol. E95-A  No. 7 ; pp. 1136-1155
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
identification schemekey encapsulation mechanismone-way-CCA2 securityconcurrent man-in-the-middle attackthe computational Diffie-Hellman assumption
 Summary | Full Text:PDF

An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
Bagus SANTOSO Kazuo OHTA Kazuo SAKIYAMA Goichiro HANAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 92-103
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Identification
Keyword: 
identification schemeRFIDzero-knowledgeimpersonation
 Summary | Full Text:PDF

A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off between ZK and Correctness
Bagus SANTOSO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 122-136
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
identification schemezero-knowledgeimpersonation under serial active attack
 Summary | Full Text:PDF

A Digital Signature Scheme Based on NP-Complete Lattice Problems
Shunichi HAYASHI Mitsuru TADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/05/01
Vol. E91-A  No. 5 ; pp. 1253-1264
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
NP-complete problemlatticeidentification schemesignature scheme
 Summary | Full Text:PDF

Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement
Haeryong PARK Kilsoo CHUN Seungho AHN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/03/01
Vol. E91-B  No. 3 ; pp. 900-903
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
identity-based cryptosystemidentification schemenon-interactive public key distribution
 Summary | Full Text:PDF

An Identification Scheme with Tight Reduction
Seiko ARITA Natsumi KAWASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1949-1955
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
identification schemerewindingKEA1 assumptiontight reduction
 Summary | Full Text:PDF