A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme
スポンサーリンク
概要
- 論文の詳細を見る
Schnorr's identification scheme is the most efficient and simplest scheme based on the discrete logarithm problem. Unfortunately, Schnorr's scheme is not provably secure, i. e. , the security has not been proven to be reducible to well defined intractable problems. Two works have already succeeded to construct provably secure variants of Schnorr's scheme. They have been constructed with a common approach, i. e. , by modifying the formula to compute the public key so that each public key has multiple secret keys. These multiple secret keys seem to be essential for their provable security, but also give rise to a penalty in their efficiency. In this paper, we describe a new approach to constructing a provably secure variant, where we never modify the formula, and show that with our approach, we can construct a new efficient provably secure scheme.
- 社団法人電子情報通信学会の論文
- 1995-09-25
著者
-
TANAKA Hatsukazu
Faculty of Engineering, Kobe University
-
Hada S
Ibm Tokyo Res. Lab. Yamato‐shi Jpn
-
Hada Satoshi
Faculty of Engineering, Kobe University
-
Tanaka Hatsukazu
Faculty Of Engineering Kobe University
関連論文
- Image Size Invariant Visual Cryptography (Special Section on Information Theory and Its Applications)
- Size-Reduced Visual Secret Sharing Scheme(Discrete Mathematics and Its Applications)
- Transitive Signature Scheme for Directed Trees
- Polynomial Representation of a Visual Secret Sharing Scheme and Its Application
- A Code Construction for M-Choose-T Communication over the Multiple-Access Adder Channel
- Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions
- A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme
- A Search Algorithm for Bases of Calderbank-Shor-Steane Type Quantum Error-Correcting Codes(Coding Theory)(Regular Section)
- A New Method of Measuring the Blocking Effects of Images Based on Cepstral Information
- Identity-Based Non-interactive Key Sharing (Special Section on Cryptography and Information Security)
- On the Security of the ElGamal-Type Signature Scheme with Small Parameters (Special Section on Cryptography and Information Security)
- On the Security of the Improved Knapsack Cryptosystem (Special Section on Information Theory and Its Applications)