The Search for Provably Secure Identification Schemes

نویسنده

  • ADI SHAMIR
چکیده

1. Introduction. An identification scheme is a protocol which enables party A to prove his identity to party B in the presence of imposters G. This is one of the fundamental problems in cryptography, and it has numerous practical applications. In fact, whenever we present a driver's license, use a passport, pay with a credit card, enter a computer password, or punch a secret code into an automatic teller machine, we execute an identification protocol. The basic problem with these practical protocols is that A proves his identity by revealing to B a constant (in the form of a printed card or a memorized value). A sophisticated adversary C who cooperates with a dishonest B can use a xerox copy of the card or a recording of the secret value to misrepresent himself successfully as A at a later stage. Our goal in this paper is to survey some of the mathematical techniques developed to solve this problem, and to propose a new identification scheme which is provably secure if factoring is difficult, and orders of magnitude faster than previous schemes of this type. The mathematical version of the identification problem assumes that A is distinguished by knowing some secret information s which no one else knows. A's goal is to prove to B that he knows s, and 5's goal is to verify the correctness of A's proof. B is assisted by the public information v revealed in advance by A. Since v is also available to G, there should be no efficient algorithm for computing s from v, even though the two values are obviously related. The authenticity of v is guaranteed by publishing it in a public key directory or by attaching to it the digital signature of a trusted center, and thus we do not consider attacks in which G replaces J4'S real v by a modified v f .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes

This paper presents a three-move interactive identification scheme and proves it to be as secure as t h e discrete logarithm problem. This provably secure scheme is almost as efficient as t,he Schnorr identification scheme, while the Schnorr scheme is not provably secure. This paper also presents another practical identification scheme which is proven to be as secure as the factoring problem ar...

متن کامل

Provably secure identity-based identification and signature schemes from code assumptions

Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such...

متن کامل

Practical Identification Schemes as Secure as the DL and RSA problems (Submission to P1363a)

We present a practical three-move interactive identification scheme, ID-DL, and prove it to be as secure as the discrete logarithm problem. ID-DL is almost as efficient as the Schnorr identification scheme, which is not provably secure. We also present another practical identification scheme, ID-RSA, which is proven to be as secure as the RSA problem and almost as efficient as the Guillou-Quisq...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010