Security bounds for parallel versions of identification protocols

  • Authors:
  • Lidong Chen;Ivan Damgard

  • Affiliations:
  • Department of Mathematics, Aarhus University, Denmark;Department of Mathematics, Aarhus University, Denmark

  • Venue:
  • EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security bounds we will define and discuss in this paper is an universal security measure for parallel versions of identification protocols. From this bound we can judge which of the security measures defined in [FFS], [FeS], [OO] are satisfied. The bounds are controllable in the sense that they are connected with a security parameter. When the bound is a "sharp-threshold" security bound, it is tight enough to describe the security of the protocol precisely, Using this bound, we discuss the generalized Fiat-Shamir identification scheme ID(L,k,t,n) which is defined in [CDL]. Under the assumption that there is no polynomial time algorithm of factoring, the parallel version of the scheme is secure in the sense that even cheating verifier B can get some information from the interacting with the prover, the information he get is absolutely useless for cheating.