Cryptosystem Identification Scheme Based on ASCII Code Statistics
نویسندگان
چکیده
منابع مشابه
Improved code-based identification scheme
We revisit the 3-pass code-based identification scheme proposed by Stern at Crypto’93, and give a new 5-pass protocol for which the probability of the cheater is ≈ 1/2 (instead of 2/3 in the original Stern’s proposal). Furthermore, we propose to use quasi-cyclic construction in order to dramatically reduce the size of the public key. The proposed scheme is zero-knowledge and relies on an NPcomp...
متن کاملCryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks. key words: cryptanalysis, user identification, ID-based cryptosystem, wi...
متن کاملCryptanalysis of an efficient user identification scheme based on ID-based cryptosystem
In 2004, Hwang et al. proposed an efficient user identification scheme based on ID-based cryptosystem. This paper will show that Hwang et al.’s scheme is not secure by presenting an forgery attack on them.
متن کاملCode-Based Key Encapsulation from McEliece's Cryptosystem
In this paper we show that it is possible to extend the framework of Persichetti’s Nierreiter-based KEM [11] and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.
متن کاملAn alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Fuzzy vault is a practical and promising scheme, which can protect biometric templates and perform secure key management simultaneously. Alignment of the template biometric sample and the query one in the encrypted domain remains a challenging task. While implementing fuzzy fingerprint vault, the accuracy of alignment in encrypted domain cannot be ensured and the information leakage may be caus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2020
ISSN: 1939-0122,1939-0114
DOI: 10.1155/2020/8875864