A Note on the Cramer-Damgård Identification Scheme

  • Yunlei Zhao
  • Shirley H. C. Cheung
  • Binyu Zang
  • Bin Zhu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3828)


In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zero-knowledge (ZK) protocols when the verifier has his public-key, we re-investigate the Cramer-Damgård intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack. Our attacks are independent of the underlying hardness assumptions assumed.


Cryptography identification scheme \({\it \Sigma}_{OR}\) man-in-the- middle attacks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., Quisquater, J.J.: Secure Implementation of Identification Systems. Journal of Cryptology 1991(4), 175–183 (1991)Google Scholar
  2. 2.
    Cramer, R., Damgård, I.: Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 75–87. Springer, Heidelberg (1997)Google Scholar
  3. 3.
    Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)Google Scholar
  4. 4.
    Damgård, I.: On Σ-protocols. A lecture note for the course of Cryptographic Protocol Theory at Aarhus University (2003),
  5. 5.
    Feige, U., Fiat, A., Shamir, A.: Zero-knowledge Proof of Identity. Journal of Cryptology 1(2), 77–94 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)Google Scholar
  7. 7.
    Guillou, L., Quisquater, J.J.: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)Google Scholar
  8. 8.
    Micali, S., Reyzin, L.: Soundness in the Public-Key Model. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 542–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Schnorr, C.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 24 (1991)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yunlei Zhao
    • 1
  • Shirley H. C. Cheung
    • 2
  • Binyu Zang
    • 1
  • Bin Zhu
    • 3
  1. 1.Software SchoolFudan UniversityShanghaiP.R. China
  2. 2.Department of Computer ScienceCity University of Hong KongHong Kong
  3. 3.Microsoft Research AsiaBeijingP.R. China

Personalised recommendations