Rank AGS Identification Scheme and Signature Scheme
نویسندگان
چکیده
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity another verifier) without revealing the secret key verifier. can apply Fiat–Shamir transformation convert an scheme into signature which be used for achieving security purposes and cryptographic purposes, especially authentication. In this paper, we recall protocol, namely RankID scheme, show that incorrect insecure. Then, proposed more natural approach construct rank version AGS our construction overcomes flaws in scheme. Our proposal achieves better results when comparing public size, size with existing schemes, such as Rank RVDC CVE schemes. also 90%, 50%, 96% reduction compared
منابع مشابه
Realisation of a minimum-knowledge identification and signature scheme
A minimum-knowledge scheme allows a claimant to prove its Identity to a verifier without disclosing any secret information. Minimum-knowledge schemes, incorporating identity verification, signature generation and verification, are generally based on interactive proofs. The Ohta-Okamoto minimum-knowledge identification and signature scheme is characterised by a good balance between the claimant’...
متن کاملAn Improvement of the Fiat-Shamir Identification and Signature Scheme
In 1986 Fiat and Shamir exhibited zero-knowledge based identification and digital Signature schemes which require only 10 to 30 modular multiplications per party. In this paper we describe an improvement of this scheme which reduces the verifier’s complexity to less than 2 modular multiplications and leaves the prover’s complexity unchanged. The new variant is particularly useful when a central...
متن کاملCertificateless undeniable signature scheme
The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and formalize the security notions for certi...
متن کاملProxy Blind Signature Scheme
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind signature wh...
متن کاملAnonymous signature scheme
In order to hide the identity of a signer, an anonymous signature scheme is presented in this paper. In this scheme, a signer located in a specified group produces a signature on behalf of the group. The recipient can verify whether the signature is valid and comes from the specified group, while tracing the signature to its source is impossible. The proposed anonymous signature is similarly to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11051139