Advances in Cryptology — CRYPTO’ 86

  • Odlyzko A
  • Fiat A
  • Shamir A
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack if factoring is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control systems.

Cite

CITATION STYLE

APA

Odlyzko, A., Fiat, A., & Shamir, A. (2006). Advances in Cryptology — CRYPTO’ 86, 263, 186-194–194. Retrieved from http://www.springerlink.com/content/cp9tqrxmgdr55rv5/

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free