Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chapter 11 Exercises Exercise 1 Breaking the RDSA Identification Scheme An identification scheme is an interactive protocol in which a prover wants to convince a verifier that he knows some private information. It can be used, for instance, in access control. The original RDSA iden- tification scheme was proposed by Ingrid Biehl, Johannes Buchmann, Safuat Hamdy, and Andreas Meyer in [2]. The security issues about this scheme were raised by Pierre-Alain Fouque and Guillaume Poupard in PI Let s and t be some given security parameters (e.g., s = 1024 bits and t = 160 bits). We assume that the prover and the verifier have set up some public parameters, that the prover (only) has a private key, and that the verifier has the public key of the prover. Those values are set up as follows. Public Parameters: a large integer n of size s, an element y E ZE, a prime q of size t Private Key: an integer a E [2, q - 11 Public Key: a = ya mod n Following the identification scheme on Figure 11.1, the prover convinces the verifier that he knows the private key without disclosing it. EXERCISE BOOK Prover Verifier choose
Published: Jan 1, 2006
Keywords: Hash Function; Signature Scheme; Blind Signature; Pseudorandom Number Generator; Cryptographic Protocol
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.