An efficient and secure two-flow zero-knowledge identification protocol

In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure und...

Full description

Bibliographic Details
Main Authors: Stinson D. R., Wu J.
Format: Article
Language:English
Published: De Gruyter 2007-08-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/JMC.2007.010
id doaj-e1222b2b47d147cab4dace9bf9e18c0c
record_format Article
spelling doaj-e1222b2b47d147cab4dace9bf9e18c0c2021-09-06T19:39:35ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842007-08-011320122010.1515/JMC.2007.010An efficient and secure two-flow zero-knowledge identification protocolStinson D. R.Wu J.In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure under the strongest attack model which incorporates concurrent attacks, active-intruder attacks and reset attacks. Meanwhile its performance in computation and communication is close to that of the most efficient identification protocols not based on signature or encryption systems, most of which are insecure in this strong attack model.https://doi.org/10.1515/JMC.2007.010identification,entity authentication,zero-knowledge.
collection DOAJ
language English
format Article
sources DOAJ
author Stinson D. R.
Wu J.
spellingShingle Stinson D. R.
Wu J.
An efficient and secure two-flow zero-knowledge identification protocol
Journal of Mathematical Cryptology
identification,
entity authentication,
zero-knowledge.
author_facet Stinson D. R.
Wu J.
author_sort Stinson D. R.
title An efficient and secure two-flow zero-knowledge identification protocol
title_short An efficient and secure two-flow zero-knowledge identification protocol
title_full An efficient and secure two-flow zero-knowledge identification protocol
title_fullStr An efficient and secure two-flow zero-knowledge identification protocol
title_full_unstemmed An efficient and secure two-flow zero-knowledge identification protocol
title_sort efficient and secure two-flow zero-knowledge identification protocol
publisher De Gruyter
series Journal of Mathematical Cryptology
issn 1862-2976
1862-2984
publishDate 2007-08-01
description In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure under the strongest attack model which incorporates concurrent attacks, active-intruder attacks and reset attacks. Meanwhile its performance in computation and communication is close to that of the most efficient identification protocols not based on signature or encryption systems, most of which are insecure in this strong attack model.
topic identification,
entity authentication,
zero-knowledge.
url https://doi.org/10.1515/JMC.2007.010
work_keys_str_mv AT stinsondr anefficientandsecuretwoflowzeroknowledgeidentificationprotocol
AT wuj anefficientandsecuretwoflowzeroknowledgeidentificationprotocol
AT stinsondr efficientandsecuretwoflowzeroknowledgeidentificationprotocol
AT wuj efficientandsecuretwoflowzeroknowledgeidentificationprotocol
_version_ 1717770394709000192