Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Non-interactive zero-knowledge and its applications
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
Protecting digital media content
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract)
ICALP '97 Proceedings of the 24th International Colloquium on Automata, Languages and Programming
Non-Interactive Zero-Knowledge Proof Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Modification of the Fiat-Shamir Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive Oblivious Transfer and Spplications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Electronic cash on the Internet
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Off-Line Cash Transfer by Smart Cards.
Off-Line Cash Transfer by Smart Cards.
The secure distribution of digital contents
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Fair Cryptosystems
Digital Image Watermarking: An Overview
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Hi-index | 0.00 |
In case of mobile agent based computing system such as agent-based electronic payment and online electronic publishing of multimedia contents, both precise identification and secure authentication schemes are required for its security. The public-key cryptosystem and the digital signature scheme have been the foundation of overall secure systems. The requirement for providing agent based secure digital contents in electronic commerce is to implement the compatible secure entity authentication scheme. In this paper, existing discrete logarithm based Schnorr like authentication schemes are improved by the analysis of performance and security on the interactive protocols. And ElGamal type authentication schemes are also proposed. Then, they are enhanced with oblivious transfer based non-interactive public key cryptosystem for entity authentication. Proposed non-interactive protocols are applicable to the noninteractive zero knowledge proofs and they can provide compatible performance and safety in distributed commerce applications such as copyright protection system on multimedia contents.