Identification Protocols in Cryptography

Michael O’Donnell

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly, the rationale behind the need for Identification Protocols is discussed. Secondly, we examine, in detail, challenge-response protocols, based upon zero-knowledge proofs, that form a subset of Identification Protocols in general. Thirdly, the mathematical tools necessary for the understanding of how these protocols work is given. Finally, we discuss four main Identification Protocols: Fiat-Shamir, Feige-Fiat-Shamir, Schnorr and Guillou- Quisquater. This discussion includes the theory, practical examples and the security aspects of each protocol.
Original languageEnglish
JournalITB Journal
DOIs
Publication statusPublished - 2002
Externally publishedYes

Keywords

  • identification protocols
  • cryptography

Fingerprint

Dive into the research topics of 'Identification Protocols in Cryptography'. Together they form a unique fingerprint.

Cite this