On the security of a practical identification scheme (Q1819122): Difference between revisions
From MaRDI portal
Created a new Item |
Created claim: Wikidata QID (P12): Q127847528, #quickstatements; #temporary_batch_1722281465132 |
||
(7 intermediate revisions by 6 users not shown) | |||
Property / reviewed by | |||
Property / reviewed by: Ian F. Blake / rank | |||
Property / reviewed by | |||
Property / reviewed by: Ian F. Blake / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s001459900056 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2018752427 / rank | |||
Normal rank | |||
Property / Wikidata QID | |||
Property / Wikidata QID: Q127847528 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 20:33, 29 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the security of a practical identification scheme |
scientific article |
Statements
On the security of a practical identification scheme (English)
0 references
6 June 2000
0 references
An identification scheme is an interactive protocol in which one party, \(P\), the prover, attempts to convince another party, the verifier, \(V\), of its identity. The prover has a public and private key which are used to effect the protocol. Various types of attack of the system might be considered, from a passive attack where the adversary does not interact with the system before attempting impersonation, to an active attack where the adversary poses as \(V\) and interacts as \(V\) but not necessarily following the protocol. Other intermediate types of attack are also possible. For the \(2^m\)th root scheme of interest here, a modulus \(n\) is chosen as the product of two `Blum' primes, both equal to 3 modulo 4 (not an essential feature of the work). An element \(a\) is chosen at random and \(b\) is set to \(a^q,~q=2^m\) where \(m\) is such that \(2^m\) grows faster than any polynomial in the security parameter \(k\), and \(m = O(k)\). The public key is then \((b,n)\) and the secret key is \(a\). The protocol then executes the following steps once: 1. \(P\) chooses \(r\) at random, computes \(x = r^q\) and sends \(x\) to \(V\). 2. \(V\) chooses \(e \in \{ 0, \dots , q-1 \}\) at random and sends \(e\) to \(P\). 3. \(P\) computes \(y = r \cdot a^e\) and sends \(y\) to \(V\); \(V\) accepts if \(y^q = x \cdot b^e\) and rejects otherwise. The efficiency of this scheme is superior to the more usual square root scheme. It is shown here that the scheme is secure if factoring is hard, even against active attacks where the adversary is first allowed to pose as a verifier before attempting impersonation. Although this scheme is not new, its security was not apparently fully understood.
0 references
identification schemes
0 references
proof of security
0 references
zero knowledge proof
0 references