Abstract
Fiat and Shamir have proposed to use zero-knowledge interactive proofs to obtain secure identification mechanisms. Real time attacks in which active eavesdroppers relay questions and answers or in which the prover helps deliberately an impersonator have been described [4]. In this paper a solution against such frauds is given and (based on some physical assumptions) it is proved that the solution protects against the real-time attacks.
Work done while visiting the EISS, University of Karlsruhe, West Germany.
Chapter PDF
6 References
C. H. Bennett and G. Brassard. An update on quantum cryptography. In Advances in Cryptology. Proc. of Crypto’84 (Lecture Notes in Computer Science 196), pp. 475–480. Springer-Verlag, New York, 1985. Santa Barbara, August 1984.
J. H. Conway. On numbers and games. Academic Press Inc., London, U.K., 1976.
Y. Desmedt. Major security problems with the “unforgeable” (Feige-)Fiat-Shamir proofs of identity and how to overcome them. In Securicom 88, 6th worldwide congress on computer and communications security and protection, pp. 147–159. SEDEP Paris France, March 15–17, 1988.
Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’ 87 (Lecture Notes in Computer Science 293), pp. 21–39. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16–20.
A. Einstein. Relativitätstheorie. Friedr. Vieweg, Braunschwig, 1916.
U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2), pp. 77–94, 1988.
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto’86 (Lecture Notes in Computer Science 263), pp. 186–194. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11–15.
A. Fiat and A. Shamir. Unforgeable proofs of identity. In Securicom 87, pp. 147–153, March 4–6, 1987. Paris, France.
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1), pp. 186–208, February 1989.
P. D. Merillat. Secure stand-alone positive personnel identity verification system (ssa-ppiv). Technical Report SAND79-0070, Sandia National Laboratories, March 1979.
N. F. Ramsey. Precise measurement of time. American Scientist, 76, pp. 42–49, January–February 1988.
G. J. Simmons. A system for verifying user identity and authorization at the point-of sale or access. Cryptologia, 8(1), pp. 1–21, January 1984.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beth, T., Desmedt, Y. (1991). Identification Tokens — or: Solving The Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_12
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive