Feige-Fiat-Shamir Identi cation Based On Real Quadratic Fields

نویسنده

  • Safuat Hamdy
چکیده

We describe Feige-Fiat-Shamir type identiication schemes that work in real quadratic elds. The security of those schemes relies on the diiculty of nding the generator of a given principal ideal. We present three variants, discuss the choice of parameters, explain in an al-gorithmic way how to execute the single protocol steps, and give running times and storage requirements obtained from our implementation of the schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feige-Fiat-Shamir ZKP Scheme Revisited

In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the ...

متن کامل

A Cryptographic Study of Some Digital Signature Schemes

RSA Cryptosystem ElGamal Cryptosystem Messey Omura Cryptosystem Knapsack Cryptosystem Construction of Knapsack Cryptosystem Quadratic Residue Cryptosystem Hybrid Cryptosystem: Diffie Hellman’s key Exchange Digital Signatures A Classification of Digital Signature Schemes Digital Signature Schemes with Appendix Digital Signature Schemes with Message Recovery RSA Signature Scheme Feige– Fiat – Sha...

متن کامل

A new identi cation scheme based on syndromedecoding ?

Zero-knowledge proofs were introduced in 1985, in a paper by Goldwasser, Micali and Rackoo ((6]). Their practical signiicance was soon demonstrated in the work of Fiat and Shamir ((4]), who turned zero-knowledge proofs of quadratic residuosity into eecient means of establishing user identities. Still, as is almost always the case in public-key cryptography, the Fiat-Shamir scheme relied on arit...

متن کامل

On Concrete Security Treatment of Signatures Derived from Identi cation

Signature schemes that are derived from three move identi cation schemes such as the Fiat-Shamir, Schnorr and modi ed ElGamal schemes are a typical class of the most practical signature schemes. The random oracle paradigm [1, 2, 12] is useful to prove the security of such a class of signature schemes [4, 12]. This paper presents a new key technique, \ID reduction", to show the concrete security...

متن کامل

Building the African Infrastructure for Development : The Role of the African University

In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000