Zero-knowledge authentication scheme with secret key exchange

10Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

In this paper we formally define proof systems for functions and develop an example of such a proof with a constant number of rounds, which we modify (at no extra communication cost) into an identification scheme with secret key exchange for subsequent conventional encryption. Implemented on a standard 32-bit chip or similar, the whole protocol, which involves mutual identification of two users, exchange of a random common secret key, and verification of certificates for the public keys (RSA, 512 bits) takes less than 3/4 second. © 1998 International Association for Cryplologic Research.

Cite

CITATION STYLE

APA

Brandt, J., Damgârd, I., Landrock, P., & Pedersen, T. (1998). Zero-knowledge authentication scheme with secret key exchange. Journal of Cryptology, 11(3), 147–159. https://doi.org/10.1007/s001459900041

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free