Secure Implementation of Identification Systems 1

In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are concep- tually more complicated than necessary.