In this paper, we analyze the security of two zero-knowledge identification schemes based on cornbinatorial NP-cornplete problems, PKP (Shamir [3]) and CLE (Stem [5]). We use two different approaches in order to determine, on the one hand, the theoretical limit to the efficiency of the known attacks
On the Security of a Practical Identification Scheme
โ Scribed by Victor Shoup
- Book ID
- 105840038
- Publisher
- Springer
- Year
- 1999
- Tongue
- English
- Weight
- 84 KB
- Volume
- 12
- Category
- Article
- ISSN
- 0933-2790
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
We present in this paper an idea ofhow to reduce the number of possible permutations when trying to solve the permuted kernels problem. We refer to the identification scheme of Shamir [2] and we also show how a dishonest prover can maximize his prospects to pass the test.
## In 2001, Harn and Lin [4] proposed a non-repudiation metering scheme. In this paper, we reveal two security weaknesses in their scheme, which could make the scheme either too inefficient or incapable of presenting the exact visiting number of a server. An improved scheme will be presented in th