Presentation | 2010-03-04 A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki ANADA, Seiko ARITA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fact, keeping efficiency as an interactive proof, it needs only 2-round interaction. Moreover, based on tight reduction to the Gap Computational Diffie-Hellman Assumption, and without the random oracle, it is secure against concurrent man-in-the-middle attacks. Our scheme has a prototype scheme similar to half the operation of Diffie-Hellman Key-Exchange. The prototype is secure only against two-phase concurrent attacks based on stronger assumptions. Applying tag technique and employing a one-time signature in the prototype, we get the preferable scheme above. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | identification scheme / round-efficiency / concurrent man-in-the-middle attack / the Gap Computational Diffie-Hellman Assumption / tight reduction |
Paper # | IT2009-76,ISEC2009-84,WBS2009-55 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2010/2/25(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks |
Sub Title (in English) | |
Keyword(1) | identification scheme |
Keyword(2) | round-efficiency |
Keyword(3) | concurrent man-in-the-middle attack |
Keyword(4) | the Gap Computational Diffie-Hellman Assumption |
Keyword(5) | tight reduction |
1st Author's Name | Hiroaki ANADA |
1st Author's Affiliation | Institute of Information Security() |
2nd Author's Name | Seiko ARITA |
2nd Author's Affiliation | Institute of Information Security |
Date | 2010-03-04 |
Paper # | IT2009-76,ISEC2009-84,WBS2009-55 |
Volume (vol) | vol.109 |
Number (no) | 445 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |