Identity-Based Identification and Signature Schemes using Error Correcting Codes

Pierre-Louis Cayrel, P. Gaborit, M. Girault
{"title":"Identity-Based Identification and Signature Schemes using Error Correcting Codes","authors":"Pierre-Louis Cayrel, P. Gaborit, M. Girault","doi":"10.3233/978-1-58603-947-9-119","DOIUrl":null,"url":null,"abstract":"Abstract. In this paper, we propose a new identity-based authentica-tion (and signature) scheme based on error-correcting codes. This schemeis up to date the first identity-based scheme not based on number theory.The scheme combines two well known code-based schemes: the signaturescheme of Courtois, Finiasz and Sendrier and the zero-knowledge au-thentication scheme of Stern (which may also be used for signature).The scheme inherits from the characteristics of the previous schemes: ithas a large public key of order 1Mo and necessitates a certain number ofexchange rounds. The scheme can also work in signature but leads to avery large signature of size 1Mo.Keywords : Signature, Authentication, Identity based scheme, Correct-ing codes, Stern, Niederreiter. 1 Introduction Themostcriticalpointofclassicalpublickeycryptography(RSA,ElGamal...)is in the management of the authenticity of the public key. In fact, if Alice man-ages to take Bob’s identity by cheating her own public key as Bob’s one, shewould be able to decipher all messages sent to Bob and to sign any messageusing the stolen identity.In 1984, Shamir introduced the concept of IDentity-based Public Key Cryp-tography ID-PKC [15] in order to simplify the management and the authenti-cation of the public key, which time passing by, had become more and morecomplex.In the ID-PKC scheme of Shamir, the public key of an user is undeniablylinked to his identity on the network (user-id): it can be a concatenation ofany publicly known information: his name, his e-mail, his phone number, etc ...","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Identity-Based Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-58603-947-9-119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24

Abstract

Abstract. In this paper, we propose a new identity-based authentica-tion (and signature) scheme based on error-correcting codes. This schemeis up to date the first identity-based scheme not based on number theory.The scheme combines two well known code-based schemes: the signaturescheme of Courtois, Finiasz and Sendrier and the zero-knowledge au-thentication scheme of Stern (which may also be used for signature).The scheme inherits from the characteristics of the previous schemes: ithas a large public key of order 1Mo and necessitates a certain number ofexchange rounds. The scheme can also work in signature but leads to avery large signature of size 1Mo.Keywords : Signature, Authentication, Identity based scheme, Correct-ing codes, Stern, Niederreiter. 1 Introduction Themostcriticalpointofclassicalpublickeycryptography(RSA,ElGamal...)is in the management of the authenticity of the public key. In fact, if Alice man-ages to take Bob’s identity by cheating her own public key as Bob’s one, shewould be able to decipher all messages sent to Bob and to sign any messageusing the stolen identity.In 1984, Shamir introduced the concept of IDentity-based Public Key Cryp-tography ID-PKC [15] in order to simplify the management and the authenti-cation of the public key, which time passing by, had become more and morecomplex.In the ID-PKC scheme of Shamir, the public key of an user is undeniablylinked to his identity on the network (user-id): it can be a concatenation ofany publicly known information: his name, his e-mail, his phone number, etc ...
使用纠错码的基于身份的识别和签名方案
摘要本文提出了一种基于纠错码的基于身份的认证(和签名)方案。该方案是迄今为止第一个不基于数论的基于恒等式的方案。该方案结合了两个著名的基于代码的方案:Courtois, Finiasz和Sendrier的签名方案和Stern的零知识认证方案(也可用于签名)。该方案继承了之前方案的特点:具有一个量级为1Mo的大公钥,并且需要一定的交换轮数。该方案也可以在签名中工作,但会导致非常大的签名大小为1Mo。经典公钥密码学(RSA、ElGamal等)最关键的一点在于对公钥真实性的管理。事实上,如果Alice设法通过欺骗自己的公钥作为Bob的公钥来获取Bob的身份,她将能够破译发送给Bob的所有消息,并使用被盗的身份签署任何消息。1984年,Shamir引入了基于身份的公钥密码学ID-PKC的概念[15],以简化随着时间的推移而变得越来越复杂的公钥管理和认证。在Shamir的ID-PKC方案中,用户的公钥不可否认地与他在网络上的身份(user-id)相关联:它可以是任何公开信息的串联:他的姓名,他的电子邮件地址,他的电话号码等……
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信