Skip to main content

A survey of identification schemes

  • Section 4 Protection Of Information
  • Conference paper
  • First Online:
EUROCODE '90 (EUROCODE 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 514))

  • 136 Accesses

Abstract

The goal of this lecture is to present and compare a large variety of recent cryptographic schemes used to corroborate the identity claimed by an entity. The protocols used in these schemes are minimum (or even zero)-knowledge protocols, in that they provably leak no substantial knowledge on the entity's secret key, provided the mathematical problems on which they lie are effectively hard. Are considered schemes based on factorization problem (Fiat-Shamir, Guillou-Quisquater, ...), on discrete logarithm problem (Chaum et al., Beth, Schnorr, ...), or both (Brickell-Mc Curley, Girault). We also show how less traditional problems -at least in cryptography- are also used to build such schemes, as general linear decoding problem (Stern) or permuted kernels problem (Shamir). In this summary, we introduce the reader to the topic, say a little word about each of the schemes mentioned above, describe some of them in detail and provide a bibliography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4. Bibliography

  1. T. Beth, "A Fiat-Shamir-like authentication protocol for the ElGamal scheme", Advances in Cryptology, Proc. of EUROCRYPT'88, LNCS 330, Springer-Verlag, 1988, pp.77–86.

    Google Scholar 

  2. E. F. Brickell and K. S. McCurley, "An interactive identification scheme based on discrete logarithms and factoring", Proc. of EUROCRYPT'90, to appear.

    Google Scholar 

  3. D. Chaum, J.H. Evertse and J. van de Graaf, "An improved protocol for demonstrating possession of discrete logarithms and some generalizations", Advances in Cryptology, Proc. of EUROCRYPT'87, LNCS 304, Springer-Verlag, 1988, pp. 127–141.

    Google Scholar 

  4. Data Encryption Standard, National Bureau of Standards, Federal Information Processing Standards, Publ. 46, 1977.

    Google Scholar 

  5. W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, Vol.IT-22, Nov.1976, pp.644–654.

    Article  Google Scholar 

  6. M.J. Fischer, S. Micali and C. Rackoff, "A secure protocol for the oblivious transfer", presented at EUROCRYPT'84, Paris, 9–11 Apr.1984.

    Google Scholar 

  7. A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems", Advances in Cryptology, Proc. of CRYPTO'86, LNCS 263, Springer-Verlag, 1987, pp.186–194.

    Google Scholar 

  8. M. Girault, "Recent solutions to entity authentication problem", Proc. of ARESAD seminar on Analysis and Management of International Crises, to appear.

    Google Scholar 

  9. M. Girault, "An identity-based identification scheme based on discrete logarithms modulo a composite number", Proc. of EUROCRYPT'90, to appear.

    Google Scholar 

  10. M. Girault, "Self-certified public keys", submitted to EUROCRYPT'91.

    Google Scholar 

  11. C.G. Günter, "Diffie-Hellman and ElGamal protocols with one single authentication key", Proc. of EUROCRYPT'89, to appear.

    Google Scholar 

  12. M. Girault and JC. Paillès, "An identity-based identification scheme providing zero-knowledge authentication and authenticated key exchange", Proc. of ESORICS 90, pp. 173–184.

    Google Scholar 

  13. L.C. Guillou and J.J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory", Advances in Cryptology, Proc. of EUROCRYPT'88, LNCS 330, Springer-Verlag, 1988, pp.123–128.

    Google Scholar 

  14. S. Goldwasser, S. Micali and C. Rackoff, "The knowledge of interactive proof-systems", 17th ACM Symposium on Theory of Computing, 1985, pp.291–304.

    Google Scholar 

  15. S. Micali and A. Shamir, "An improvement of the Fiat-Shamir identification and signature scheme", Advances in Cryptology, Proc. of CRYPTO'88, LNCS 403, Springer-Verlag, 1989, pp.244–247.

    Google Scholar 

  16. K. Ohta and T. Okamoto, "A modification of the Fiat-Shamir scheme", Advances in Cryptology, Proc. of CRYPTO'88, LNCS 403, Springer-Verlag, 1989, pp.232–243.

    Google Scholar 

  17. H. Ong and C.P. Schnorr, "Fast signature generation with the Fiat-Shamir scheme", Proc. of EUROCRYPT'90, to appear.

    Google Scholar 

  18. M.O Rabin, "How to exchange secrets by oblivious transfer", manuscript, Harvard Center for Research in Computer Technology, 1981.

    Google Scholar 

  19. M.O Rabin, "Digitalized signatures and public-key functions as intractable as factorization", MIT, Laboratory for Computer Science, MIT/LCS/TR-212, Jan.1979.

    Google Scholar 

  20. R.L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", CACM, Vol.21, no2, Feb.1978, pp.120–126.

    Google Scholar 

  21. C.P. Schnorr, "Efficient identification and signatures for smart cards", Advances in Cryptology, Proc. of CRYPTO'89, LNCS 435, Springer-Verlag, pp.239–252.

    Google Scholar 

  22. A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology, Proc. of CRYPTO'84, LNCS 196, Springer-Verlag, 1985, pp.47–53.

    Google Scholar 

  23. A. Shamir, "An efficient identification scheme based on permuted kernels", Advances in Cryptology, Proc. of CRYPTO'89, LNCS 435, Springer-Verlag, pp.606–609.

    Google Scholar 

  24. J. Stern, "An alternative to the Fiat-Shamir protocol", Proc. of EUROCRYPT'90, to appear; new version presented at Oberwolfach seminar on Cryptography, 24–30 Sept. 89.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gérard Cohen Pascale Charpin

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Girault, M. (1991). A survey of identification schemes. In: Cohen, G., Charpin, P. (eds) EUROCODE '90. EUROCODE 1990. Lecture Notes in Computer Science, vol 514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-54303-1_129

Download citation

  • DOI: https://doi.org/10.1007/3-540-54303-1_129

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54303-9

  • Online ISBN: 978-3-540-47546-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics