Secure Implementation of Identification Systems. Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., & Quisquater, J. Journal of Cryptology, 4(3):175–183, 1991.
abstract   bibtex   
In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.
@article{bengio:1991:jc,
  author  = {S. Bengio and G. Brassard and Y. Desmedt and C. Goutier and J.-J. Quisquater},
  journal  = {Journal of Cryptology},
  pages    = {175--183},
  title    = {Secure Implementation of Identification Systems},
  volume  = {4},
  number = {3},
  year    = {1991},
  web = {http://dx.doi.org/10.1007/BF00196726},
  abstract = {In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.},
  categorie  = {A}
}

% conferences

Downloads: 0