Skip to main content

On the security of Girault's identification scheme

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1431))

Included in the following conference series:

Abstract

In this paper, we describe two serious weaknesses of an identity-based identification scheme proposed by Girault (presented at Eurocrypt '90) that enables adversaries to forge identity, key pairs for a large group of users. We also show how to modify the scheme to make the attacks ineffective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Brickell and K. McCurley, ”An interactive identification scheme based on discrete logarithms”, Advances in Cryptology (Proceedings of EuroCrypt '90), Lecture Notes in Computer Science, vol. 473, Springer-Verlag, 1991, pp. 63–71

    Google Scholar 

  2. M. Girault, ”An identity-based identification scheme based on discrete logarithms modulo a composite number”, Advances in Cryptology (Proceedings of EuroCrypt '90), Lecture Notes in Computer Science, vol. 473, Springer-Verlag, 1991, pp. 481–486

    Google Scholar 

  3. M. Girault, ”Self-certified public keys”, Advances in Cryptology (Proceedings of EuroCrypt '91), Lecture Notes in Computer Science, vol. 547, Springer-Verlag, 1991, pp. 490–497

    Google Scholar 

  4. C. Schnorr, ”Efficient signature generation by smart cards”, Journal of Cryptology, vol. 4, no. 3, 1991, pp. 161–174

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saeednia, S., Safavi-Naini, R. (1998). On the security of Girault's identification scheme. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054021

Download citation

  • DOI: https://doi.org/10.1007/BFb0054021

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64693-8

  • Online ISBN: 978-3-540-69105-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics