An efficient and secure two-flow zero-knowledge identification protocol
In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure und...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2007-08-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/JMC.2007.010 |
id |
doaj-e1222b2b47d147cab4dace9bf9e18c0c |
---|---|
record_format |
Article |
spelling |
doaj-e1222b2b47d147cab4dace9bf9e18c0c2021-09-06T19:39:35ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842007-08-011320122010.1515/JMC.2007.010An efficient and secure two-flow zero-knowledge identification protocolStinson D. R.Wu J.In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure under the strongest attack model which incorporates concurrent attacks, active-intruder attacks and reset attacks. Meanwhile its performance in computation and communication is close to that of the most efficient identification protocols not based on signature or encryption systems, most of which are insecure in this strong attack model.https://doi.org/10.1515/JMC.2007.010identification,entity authentication,zero-knowledge. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Stinson D. R. Wu J. |
spellingShingle |
Stinson D. R. Wu J. An efficient and secure two-flow zero-knowledge identification protocol Journal of Mathematical Cryptology identification, entity authentication, zero-knowledge. |
author_facet |
Stinson D. R. Wu J. |
author_sort |
Stinson D. R. |
title |
An efficient and secure two-flow zero-knowledge identification protocol |
title_short |
An efficient and secure two-flow zero-knowledge identification protocol |
title_full |
An efficient and secure two-flow zero-knowledge identification protocol |
title_fullStr |
An efficient and secure two-flow zero-knowledge identification protocol |
title_full_unstemmed |
An efficient and secure two-flow zero-knowledge identification protocol |
title_sort |
efficient and secure two-flow zero-knowledge identification protocol |
publisher |
De Gruyter |
series |
Journal of Mathematical Cryptology |
issn |
1862-2976 1862-2984 |
publishDate |
2007-08-01 |
description |
In this paper, we propose a new zero-knowledge identification protocol. While the protocol
consists of only two message flows, it does not rely on any underlying signature or encryption
scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings.
It is secure under the strongest attack model which incorporates concurrent attacks, active-intruder
attacks and reset attacks. Meanwhile its performance in computation and communication is close to
that of the most efficient identification protocols not based on signature or encryption systems, most
of which are insecure in this strong attack model. |
topic |
identification, entity authentication, zero-knowledge. |
url |
https://doi.org/10.1515/JMC.2007.010 |
work_keys_str_mv |
AT stinsondr anefficientandsecuretwoflowzeroknowledgeidentificationprotocol AT wuj anefficientandsecuretwoflowzeroknowledgeidentificationprotocol AT stinsondr efficientandsecuretwoflowzeroknowledgeidentificationprotocol AT wuj efficientandsecuretwoflowzeroknowledgeidentificationprotocol |
_version_ |
1717770394709000192 |