An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries

Identification schemes are used by machines to securely authenticate the identity of other machines or their users over computer networks. As conventional public key schemes require a trusted third party (TTP) or a public file to ensure the corresponding public key matches with the identity, identit...

Full description

Bibliographic Details
Main Authors: Jason Chia, Ji-Jian Chin
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9049156/