Keyword : impersonation under active and concurrent attacks

Secure Hierarchical Identity-Based Identification without Random Oracles
Atsushi FUJIOKA Taiichi SAITO Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1307-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
hierarchical identity-based identificationimpersonation under active and concurrent attackscomputational Diffie-Hellman assumptionRSA assumption
 Summary | Full Text:PDF(652.3KB)