2013 Eighth Asia Joint Conference on Information Security 2013
DOI: 10.1109/asiajcis.2013.12
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…In this section, we review the definition of SM-IBI schemes as defined by [ 19 ]. The definition follows closely to that of conventional IBI schemes, with the difference being that the prover segment is extended to encompass obtaining tokens from the security mediator.…”
Section: Preliminariesmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we review the definition of SM-IBI schemes as defined by [ 19 ]. The definition follows closely to that of conventional IBI schemes, with the difference being that the prover segment is extended to encompass obtaining tokens from the security mediator.…”
Section: Preliminariesmentioning
confidence: 99%
“…We compare the running time of only the identification protocol, since the protocol is invoked every time a prover wishes to perform an interaction with a verifier. We compare the running times of the GQ-SM-IBI scheme and BNN-SM-IBI scheme as well as the original pairing-based scheme by [ 19 ]. We name the scheme from [ 19 ] as BLS-SM-IBI since its design follows the BLS signature scheme by Boneh et al from [ 22 ].…”
Section: Efficiency Analysismentioning
confidence: 99%
See 3 more Smart Citations