Research Article

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

Table 2

Comparison of the identification protocol with other discrete logarithm IBI schemes.

SchemeUEMGMZIMP-AA/CA

OKDL-IBI (Bellare et al., 2004 [4])3852DLP
BNN-IBI (Bellare et al., 2004 [4])2521OMDLP
Beth-IBI (Bellare et al., 2004 [4])2423Unknown
Schnorr-IBI (Heng, 2004 [6])263DLP
Tight-Schnorr-IBI (Tan et al., 2011 [8])2631DDHP
Twin-Schnorr-IBI3962DLP

U: usk components, E: exponentiation, MG: multiplication in , MZ: multiplication in , IMP-AA/CA: security assumption against impersonation under active and concurrent attack, DLP: discrete logarithm problem, OMDL: one-more discrete logarithm problem, and DDHP: decisional Diffie-Hellman problem, .