Secure implementation of identification systems

72Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

Abstract

In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation. We suggest possible solutions. On the other hand, identity-based versions of the Feige-Fiat-Shamir scheme are conceptually more complicated than necessary. © 1991 Springer-Verlag New York Inc.

Cite

CITATION STYLE

APA

Bengio, S., Brassard, G., Desmedt, Y. G., Goutier, C., & Quisquater, J. J. (1991). Secure implementation of identification systems. Journal of Cryptology, 4(3), 175–183. https://doi.org/10.1007/BF00196726

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free