Back to Search Start Over

An efficient identification protocol secure against concurrent-reset attacks

Authors :
Wu J.
Stinson D. R.
Source :
Journal of Mathematical Cryptology, Vol 3, Iss 4, Pp 339-352 (2009)
Publication Year :
2009
Publisher :
De Gruyter, 2009.

Abstract

In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [Bellare, Fischlin, Goldwasser, and Micali, Identification protocols secure against reset attacks: 495–511, Springer, 2001] which captures concurrent attacks and reset attacks. Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie–Hellman problem.

Details

Language :
English
ISSN :
18622976 and 18622984
Volume :
3
Issue :
4
Database :
Directory of Open Access Journals
Journal :
Journal of Mathematical Cryptology
Publication Type :
Academic Journal
Accession number :
edsdoj.7d16988b40e84d87864293fa13ddd176
Document Type :
article
Full Text :
https://doi.org/10.1515/JMC.2009.021