A new NP-complete problem and public-key identification (Q1866023): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: reviewed by (P1447): Item:Q587571
RedirectionBot (talk | contribs)
Changed an Item
Property / reviewed by
 
Property / reviewed by: Jozef Vyskoč / rank
 
Normal rank

Revision as of 08:09, 16 February 2024

scientific article
Language Label Description Also known as
English
A new NP-complete problem and public-key identification
scientific article

    Statements

    A new NP-complete problem and public-key identification (English)
    0 references
    0 references
    0 references
    3 April 2003
    0 references
    The theory of zero-knowledge made it possible to design secure identification schemes. However, as most of the proposed schemes are based on problems from number theory, practical implementations -- especially those for smart cards -- must deal with hard to perform modular operations using a large modulus. The paper presents an efficient identification scheme based on a combinatorial NP-complete problem -- the permuted perceptrons problem. First, the perceptrons problem is introduced and its NP-completeness is proved. Also it is shown that the problem is not only difficult to solve in the worst case, but also it cannot be efficiently approximated. From a general Goldreich-Micali-Wigderson result it follows that NP-completeness of the perceptrons problem is enough for the existence of zero-knowledge interactive proof of knowledge that can be subsequently turned into an identification protocol. However, for efficiency reasons the authors focus on a variant of the problem -- the permuted perceptrons problem and prove that the problem is also NP-complete. In the next section the practical security of both problems is analyzed. Several possible attacks are reviewed, and then practical sizes of problem instances are suggested. Then two schemes (three-pass and five-pass identification protocols) are proposed and thoroughly analyzed. The selection of the system parameters is then discussed, and a practical version of the three-pass identification scheme is described. Finally, the actual implementation of the protocol on a low-cost smart card is discussed. A brief comparison with other protocols is given as well.
    0 references
    zero-knowledge
    0 references
    permuted perceptrons problem
    0 references
    NP-completeness
    0 references
    secure identification scheme
    0 references
    0 references

    Identifiers