A note on the cramer-damgård identification scheme

  • Authors:
  • Yunlei Zhao;Shirley H. C. Cheung;Binyu Zang;Bin Zhu

  • Affiliations:
  • Software School, Fudan University, Shanghai, P.R. China;Department of Computer Science, City University of Hong Kong, Hong Kong;Software School, Fudan University, Shanghai, P.R. China;Microsoft Research Asia, Beijing, P.R. China

  • Venue:
  • WINE'05 Proceedings of the First international conference on Internet and Network Economics
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zero-knowledge (ZK) protocols when the verifier has his public-key, we re-investigate the Cramer-Damgård intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack. Our attacks are independent of the underlying hardness assumptions assumed.