Cryptanalysis of Two Identification Schemes
暂无分享,去创建一个
[1] I.I. Ibrahim,et al. Efficient zero-knowledge identification scheme with secret key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[2] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[3] Mihir Bellare,et al. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.
[4] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[5] Marc Fischlin,et al. Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.
[6] Neetu Sharma,et al. A New Zero Knowledge Identification Scheme based on Weil Pairing , 2013 .
[7] Mohamed Rasslan,et al. Identification Protocols based on Discrete Log Representation Problem , 2013, EUSPN/ICTH.
[8] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[9] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[10] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[11] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[12] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.