Abstract
The efficiency parameters of identification schemes (memory size, communication cost, computational complexity) are based on given security levels and should allow for the ‘worst-case’ probability of error (forgery). We consider instances of the schemes in [OO88] and [Sch90] for which the efficiency is not as good as claimed.
Chapter PDF
Similar content being viewed by others
References
E.F. Brickell, and K.S. McCurley. An interactive identification scheme based on discrete logarithms and factoring. Presented at Eurocrypt’ 90.
M. Burmester, and Y. Desmedt. Remarks on the soundness of proofs. Electronics Letters, 25(22), 1989, pp. 1509–1511.
U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2), 1988, pp. 77–94.
L.C Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Proceedings of Eurocrypt’ 88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp. 123–128.
A. Fiat, and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Proceedings of Crypto’86, Lecture Notes in Computer Science 206, Springer-Verlag, New York, pp. 186–194.
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1), 1989, pp. 186–208.
K. Ohta, and T. Okamoto. A modification of the Fiat-Shamir scheme. Proceedings of Crypto’ 88, Lecture Notes in Computer Science 403, Springer-Verlag, New York, pp. 232–243.
C.P. Schnorr. Efficient Identifications and Signatures for Smart Cards. Proceedings of Crypto’ 89, Lecture Notes in Computer Science 435, Springer-Verlag, New York, pp. 239–251.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Burmester, M. (1991). A remark on the efficiency of identification schemes. In: Damgård, I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46877-3_47
Download citation
DOI: https://doi.org/10.1007/3-540-46877-3_47
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53587-4
Online ISBN: 978-3-540-46877-6
eBook Packages: Springer Book Archive