Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem
Abstract
References
Recommendations
A new framework for the design and analysis of identity-based identification schemes
Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed ...
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
Information Security ApplicationsThe notion of identity-based cryptography was put forward by Shamir in 1984. This setting has also been considered in identification schemes. Since then, many identity-based identification schemes have been proposed. Nonetheless, most of them only ...
Quasi-Dyadic Girault Identification Scheme
Codes, Cryptology and Information SecurityAbstractZero-knowledge identification schemes allow a prover to convince a verifier that a certain fact is true, while not revealing any additional information.
In this paper, we propose a scheme whose security relies on the hardness of the Quasi-Dyadic ...
Comments
Information & Contributors
Information
Published In
In-Cooperation
- Wuhan Univ.: Wuhan University, China
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 63Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in