A note on the Cramer-Damgård identification scheme

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zero-knowledge (ZK) protocols when the verifier has his public-key, we re-investigate the Cramer-Damgård intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack. Our attacks are independent of the underlying hardness assumptions assumed. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Zhao, Y., Cheung, S. H. C., Zang, B., & Zhu, B. (2005). A note on the Cramer-Damgård identification scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3828 LNCS, pp. 385–390). Springer Verlag. https://doi.org/10.1007/11600930_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free