Get access

Certificateless identification protocols from super singular elliptic curve

Authors

  • Massoud Hadian Dehkordi,

    1. Department of Mathematical Sciences, Iran University of Science and Technology, Narmak, Tehran, Iran
    Search for more papers by this author
  • Reza Alimoradi

    Corresponding author
    1. Department of Mathematical Sciences, Iran University of Science and Technology, Narmak, Tehran, Iran
    2. Faculty of Science, University of Qom, Qom, Iran
    • Correspondence to: Reza Alimoradi, Department of Mathematical Sciences, Iran University of Science and Technology, Narmak, Tehran, Iran.

      E-mail: alimoradi.r@gmail.com

    Search for more papers by this author

ABSTRACT

To transmit information through very limited secure channels, we can use public key cryptosystems. A new kind of public key system, called identity-based public key system, sets the users' public identity, for example, their email addresses, as their public key. This characteristic of identity-based public key systems decreases expense and increases speed in executing many important protocols in data security such as cryptography, identification, key agreement, and digital signatures. But, the major shortcoming of these systems is Key Escrow (legal key retrieval) and also the key generation center's ability to impersonate users. In this paper, two certificateless identity-based identification schemes devoid of the aforementioned shortcomings are represented. These are Challenge-response Identification protocols. Also, the second scheme introduced in this paper has the batch verification quality. The security analysis of the introduced schemes will come at the end. Copyright © 2013 John Wiley & Sons, Ltd.

Ancillary