On the security of a practical identification scheme

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We analyze the security of an interactive identification scheme. The scheme is the obvious extension of the original square root scheme of Goldwasser, Micali and Rackoff to 2mth roots. This scheme is quite practical, especially in terms of storage and communication complexity. Although this scheme is certainly not new, its security was apparently not fully understood. We prove that this scheme is secure if factoring integers is hard, even against active attacks where the adversary is first allowed to pose as a verifier before attempting impersonation.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsUeli Maurer
PublisherSpringer Verlag
Pages344-353
Number of pages10
ISBN (Print)354061186X, 9783540611868
DOIs
StatePublished - 1996
Event15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996 - Saragossa, Spain
Duration: May 12 1996May 16 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1070
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996
CountrySpain
CitySaragossa
Period5/12/965/16/96

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On the security of a practical identification scheme'. Together they form a unique fingerprint.

  • Cite this

    Shoup, V. (1996). On the security of a practical identification scheme. In U. Maurer (Ed.), Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings (pp. 344-353). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1070). Springer Verlag. https://doi.org/10.1007/3-540-68339-9_30