Certificateless identification protocols from super singular elliptic curve
Article first published online: 15 AUG 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 6, pages 979–986, June 2014
How to Cite
Dehkordi, M. H. and Alimoradi, R. (2014), Certificateless identification protocols from super singular elliptic curve. Security Comm. Networks, 7: 979–986. doi: 10.1002/sec.815
- Issue published online: 24 APR 2014
- Article first published online: 15 AUG 2013
- Manuscript Accepted: 5 MAY 2013
- Manuscript Revised: 25 FEB 2013
- Manuscript Received: 26 JAN 2010
- super singular elliptic curve;
- identity-based cryptosystem;
To transmit information through very limited secure channels, we can use public key cryptosystems. A new kind of public key system, called identity-based public key system, sets the users' public identity, for example, their email addresses, as their public key. This characteristic of identity-based public key systems decreases expense and increases speed in executing many important protocols in data security such as cryptography, identification, key agreement, and digital signatures. But, the major shortcoming of these systems is Key Escrow (legal key retrieval) and also the key generation center's ability to impersonate users. In this paper, two certificateless identity-based identification schemes devoid of the aforementioned shortcomings are represented. These are Challenge-response Identification protocols. Also, the second scheme introduced in this paper has the batch verification quality. The security analysis of the introduced schemes will come at the end. Copyright © 2013 John Wiley & Sons, Ltd.