Back to Search
Start Over
An efficient identification protocol secure against concurrent-reset attacks
- Source :
- Journal of Mathematical Cryptology, Vol 3, Iss 4, Pp 339-352 (2009)
- Publication Year :
- 2009
- Publisher :
- De Gruyter, 2009.
-
Abstract
- In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [Bellare, Fischlin, Goldwasser, and Micali, Identification protocols secure against reset attacks: 495–511, Springer, 2001] which captures concurrent attacks and reset attacks. Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie–Hellman problem.
- Subjects :
- identification
entity authentication
zero-knowledge
Mathematics
QA1-939
Subjects
Details
- Language :
- English
- ISSN :
- 18622976 and 18622984
- Volume :
- 3
- Issue :
- 4
- Database :
- Directory of Open Access Journals
- Journal :
- Journal of Mathematical Cryptology
- Publication Type :
- Academic Journal
- Accession number :
- edsdoj.7d16988b40e84d87864293fa13ddd176
- Document Type :
- article
- Full Text :
- https://doi.org/10.1515/JMC.2009.021