In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary. © 1991 Springer-Verlag New York Inc.
CITATION STYLE
Bengio, S., Brassard, G., Desmedt, Y. G., Goutier, C., & Quisquater, J. J. (1991). Secure implementation of identification systems. Journal of Cryptology, 4(3), 175–183. https://doi.org/10.1007/BF00196726
Mendeley helps you to discover research relevant for your work.