Feige-Fiat-Shamir Identi cation Based On Real Quadratic Fields
نویسنده
چکیده
We describe Feige-Fiat-Shamir type identiication schemes that work in real quadratic elds. The security of those schemes relies on the diiculty of nding the generator of a given principal ideal. We present three variants, discuss the choice of parameters, explain in an al-gorithmic way how to execute the single protocol steps, and give running times and storage requirements obtained from our implementation of the schemes.
منابع مشابه
Feige-Fiat-Shamir ZKP Scheme Revisited
In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the ...
متن کاملA Cryptographic Study of Some Digital Signature Schemes
RSA Cryptosystem ElGamal Cryptosystem Messey Omura Cryptosystem Knapsack Cryptosystem Construction of Knapsack Cryptosystem Quadratic Residue Cryptosystem Hybrid Cryptosystem: Diffie Hellman’s key Exchange Digital Signatures A Classification of Digital Signature Schemes Digital Signature Schemes with Appendix Digital Signature Schemes with Message Recovery RSA Signature Scheme Feige– Fiat – Sha...
متن کاملA new identi cation scheme based on syndromedecoding ?
Zero-knowledge proofs were introduced in 1985, in a paper by Goldwasser, Micali and Rackoo ((6]). Their practical signiicance was soon demonstrated in the work of Fiat and Shamir ((4]), who turned zero-knowledge proofs of quadratic residuosity into eecient means of establishing user identities. Still, as is almost always the case in public-key cryptography, the Fiat-Shamir scheme relied on arit...
متن کاملOn Concrete Security Treatment of Signatures Derived from Identi cation
Signature schemes that are derived from three move identi cation schemes such as the Fiat-Shamir, Schnorr and modi ed ElGamal schemes are a typical class of the most practical signature schemes. The random oracle paradigm [1, 2, 12] is useful to prove the security of such a class of signature schemes [4, 12]. This paper presents a new key technique, \ID reduction", to show the concrete security...
متن کاملBuilding the African Infrastructure for Development : The Role of the African University
In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the ...
متن کامل