Secure Implementation of Identification Systems. Bengio, S., Brassard, G., Desmedt, Y., Goutier, C., & Quisquater, J. Journal of Cryptology, 4(3):175–183, 1991. abstract bibtex In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.
@article{bengio:1991:jc,
author = {S. Bengio and G. Brassard and Y. Desmedt and C. Goutier and J.-J. Quisquater},
journal = {Journal of Cryptology},
pages = {175--183},
title = {Secure Implementation of Identification Systems},
volume = {4},
number = {3},
year = {1991},
web = {http://dx.doi.org/10.1007/BF00196726},
abstract = {In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.},
categorie = {A}
}
% conferences
Downloads: 0
{"_id":"YTADpbyNyKTYzhziM","bibbaseid":"bengio-brassard-desmedt-goutier-quisquater-secureimplementationofidentificationsystems-1991","authorIDs":[],"author_short":["Bengio, S.","Brassard, G.","Desmedt, Y.","Goutier, C.","Quisquater, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["S."],"propositions":[],"lastnames":["Bengio"],"suffixes":[]},{"firstnames":["G."],"propositions":[],"lastnames":["Brassard"],"suffixes":[]},{"firstnames":["Y."],"propositions":[],"lastnames":["Desmedt"],"suffixes":[]},{"firstnames":["C."],"propositions":[],"lastnames":["Goutier"],"suffixes":[]},{"firstnames":["J.-J."],"propositions":[],"lastnames":["Quisquater"],"suffixes":[]}],"journal":"Journal of Cryptology","pages":"175–183","title":"Secure Implementation of Identification Systems","volume":"4","number":"3","year":"1991","web":"http://dx.doi.org/10.1007/BF00196726","abstract":"In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.","categorie":"A","bibtex":"@article{bengio:1991:jc,\n author = {S. Bengio and G. Brassard and Y. Desmedt and C. Goutier and J.-J. Quisquater},\n journal = {Journal of Cryptology},\n pages = {175--183},\n title = {Secure Implementation of Identification Systems},\n volume = {4},\n number = {3},\n year = {1991},\n web = {http://dx.doi.org/10.1007/BF00196726},\n abstract = {In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary.},\n categorie = {A}\n}\n\n% conferences\n\n","author_short":["Bengio, S.","Brassard, G.","Desmedt, Y.","Goutier, C.","Quisquater, J."],"key":"bengio:1991:jc","id":"bengio:1991:jc","bibbaseid":"bengio-brassard-desmedt-goutier-quisquater-secureimplementationofidentificationsystems-1991","role":"author","urls":{},"downloads":0},"bibtype":"article","biburl":"http://bengio.abracadoudou.com/samy.bib","creationDate":"2020-03-18T03:43:27.318Z","downloads":0,"keywords":[],"search_terms":["secure","implementation","identification","systems","bengio","brassard","desmedt","goutier","quisquater"],"title":"Secure Implementation of Identification Systems","year":1991,"dataSources":["9NCW2CDr4M3s5DvNX"]}