Advertisement

Efficient Identification and Signatures for Smart Cards

  • C. P. Schnorr
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 435)

Abstract

We present an efficient interactive identification scheme and a related signature scheme that are based on discrete logarithms and which are particularly suited for smart cards. Previous cryptoschemes, based on the discrete logarithm, have been proposed by El Gamal (1985), Chaum, Evertse, Graaf (1988), Beth (1988) and Günter (1989). The new scheme comprises the following novel features.

References

  1. BETH, T.: A Fiat-Shamir-like authentication protocol for the ElGamal scheme. Proceedings of Eurocrypt’ 88, Lecture Notes in Computer Science 330, (1988) pp. 77–86.Google Scholar
  2. CHAUM, D., EVERTSE, J.H. and van de GRAAF, J.: An Improved protocol for Demonstration Possession of Discrete Logarithms and some Generalizations. Proceedings of Eurocrypt’ 87, Lecture Notes in Computer Science 304, (1988), pp. 127–141.Google Scholar
  3. COPPERSMITH, D., ODLYZKO, A. and SCHROEPPEL, R.: Discrete Logarithms. Algorithmica 1, (1986), pp. 1–15.zbMATHCrossRefMathSciNetGoogle Scholar
  4. ELGAMAL, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31 (1985), pp. 469–472.zbMATHCrossRefMathSciNetGoogle Scholar
  5. FEIGE, U., FIAT, A. and SHAMIR, A.: Zero knowledge proofs of identity Proceedings of STOC 1987, pp. 210–217.Google Scholar
  6. FIAT, A. and SHAMIR, A.: How to Prove Yourself: Practical Solutions of Identification and Signature Problems. Proceedings of Crypto 1986, in Lecture Notes in Computer Science (Ed. A. Odlyzko), Springer Verlag, 263, (1987) pp. 186–194.Google Scholar
  7. GOLDWASSER, S., MICALI, S. and RACKOFF, C: Knowledge Complexity of Interactive Proof Systems. Proceedings of STOC 1985, pp. 291–304.Google Scholar
  8. GÜNTER, C.G.: Diffie-Hellman and ElGamal protocols with one single authentication key. Abstracts of Eurocrypt’ 89, Houthalen (Belgium) April 1989.Google Scholar
  9. MICALI, S. and SHAMIR, A.: An Improvement of the Fiat-Shamir Identification and Signature Scheme. Crypto 1988.Google Scholar
  10. QUISQUATER, J.J. and GUILLOU, L.S.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Proceedings Eurocrypt’ 88. Springer Verlag, Lecture Notes in Computer Sciences, vol. 330, (1988), pp. 123–128.Google Scholar
  11. RABIN, M.O.: Digital signatures and public-key functions as intractable as factorization. Technical Report MIT/LCS/TR-212 (1978).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1990

Authors and Affiliations

  • C. P. Schnorr
    • 1
  1. 1.Universität FrankfurtFrankfurt

Personalised recommendations