Presentation 2010-03-04
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki ANADA, Seiko ARITA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fact, keeping efficiency as an interactive proof, it needs only 2-round interaction. Moreover, based on tight reduction to the Gap Computational Diffie-Hellman Assumption, and without the random oracle, it is secure against concurrent man-in-the-middle attacks. Our scheme has a prototype scheme similar to half the operation of Diffie-Hellman Key-Exchange. The prototype is secure only against two-phase concurrent attacks based on stronger assumptions. Applying tag technique and employing a one-time signature in the prototype, we get the preferable scheme above.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) identification scheme / round-efficiency / concurrent man-in-the-middle attack / the Gap Computational Diffie-Hellman Assumption / tight reduction
Paper # IT2009-76,ISEC2009-84,WBS2009-55
Date of Issue

Conference Information
Committee ISEC
Conference Date 2010/2/25(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Sub Title (in English)
Keyword(1) identification scheme
Keyword(2) round-efficiency
Keyword(3) concurrent man-in-the-middle attack
Keyword(4) the Gap Computational Diffie-Hellman Assumption
Keyword(5) tight reduction
1st Author's Name Hiroaki ANADA
1st Author's Affiliation Institute of Information Security()
2nd Author's Name Seiko ARITA
2nd Author's Affiliation Institute of Information Security
Date 2010-03-04
Paper # IT2009-76,ISEC2009-84,WBS2009-55
Volume (vol) vol.109
Number (no) 445
Page pp.pp.-
#Pages 8
Date of Issue