Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume the intractability of the underlying Decisional Diffie Hellman Problem (DDHP). Due to this, the security of all such schemes in a pairing based scenario is doubtful. In this paper, we propose a two-round zero-knowledge identification protocol using bilinear pairings. Our proposed protocol has two contrasting features to traditional identification schemes: (1) The scheme requires the verifier to toss his coins before the prover. (2) The coin tosses of the verifier are secret while the coin tosses of the prover are not. As a consequence, we obtain a \emph{blind} identification scheme with complete zero knowledge. Traditionally in an identificati...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
We propose four different public-key identification schemes that make use of bilinear pairings, and ...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
Secure identification is an important security issue to avoid computer fraud due to masquerading. Th...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
We propose four different public-key identification schemes that make use of bilinear pairings, and ...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
Secure identification is an important security issue to avoid computer fraud due to masquerading. Th...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
International audienceAt CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a ...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...