TY - GEN
T1 - On the security of a practical identification scheme
AU - Shoup, Victor
PY - 1996
Y1 - 1996
N2 - We analyze the security of an interactive identification scheme. The scheme is the obvious extension of the original square root scheme of Goldwasser, Micali and Rackoff to 2mth roots. This scheme is quite practical, especially in terms of storage and communication complexity. Although this scheme is certainly not new, its security was apparently not fully understood. We prove that this scheme is secure if factoring integers is hard, even against active attacks where the adversary is first allowed to pose as a verifier before attempting impersonation.
AB - We analyze the security of an interactive identification scheme. The scheme is the obvious extension of the original square root scheme of Goldwasser, Micali and Rackoff to 2mth roots. This scheme is quite practical, especially in terms of storage and communication complexity. Although this scheme is certainly not new, its security was apparently not fully understood. We prove that this scheme is secure if factoring integers is hard, even against active attacks where the adversary is first allowed to pose as a verifier before attempting impersonation.
UR - http://www.scopus.com/inward/record.url?scp=84947923743&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947923743&partnerID=8YFLogxK
U2 - 10.1007/3-540-68339-9_30
DO - 10.1007/3-540-68339-9_30
M3 - Conference contribution
AN - SCOPUS:84947923743
SN - 354061186X
SN - 9783540611868
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 344
EP - 353
BT - Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
A2 - Maurer, Ueli
PB - Springer Verlag
T2 - 15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996
Y2 - 12 May 1996 through 16 May 1996
ER -