{"title":"一种高效的零知识识别方案的性能","authors":"A. Allam, I. I. Ibrahim, I. Ali, A.E.H. Elsawy","doi":"10.1109/ICEEC.2004.1374429","DOIUrl":null,"url":null,"abstract":"Fiat and Shamir have proposed to use ZeroKnowledge interactive proofs to obtain secure identification mechanisms. Zero-Knowledge protocols are designed to address the identification service, by allowing a prover to demonstrate knowledge of a secret while revealing no information to be use by the verifier to convey the demonstration of knowledge to others. The invention of an efficient Zero-Knowledge identification scheme has provided anther public-key cryptosystem besides the renowned Fiat-Shamir scheme, for which in addition to the identification feature both key exchange and mutual identification are available. The availability of the elliptic curve discrete logarithm problem made the invented scheme very efficient. The purpose of this paper is to show the security level performance of our scheme and show its ability to resist the brute-force attack of an unauthorized prover.","PeriodicalId":180043,"journal":{"name":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The performance of an efficient zero-knowledge identification scheme\",\"authors\":\"A. Allam, I. I. Ibrahim, I. Ali, A.E.H. Elsawy\",\"doi\":\"10.1109/ICEEC.2004.1374429\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fiat and Shamir have proposed to use ZeroKnowledge interactive proofs to obtain secure identification mechanisms. Zero-Knowledge protocols are designed to address the identification service, by allowing a prover to demonstrate knowledge of a secret while revealing no information to be use by the verifier to convey the demonstration of knowledge to others. The invention of an efficient Zero-Knowledge identification scheme has provided anther public-key cryptosystem besides the renowned Fiat-Shamir scheme, for which in addition to the identification feature both key exchange and mutual identification are available. The availability of the elliptic curve discrete logarithm problem made the invented scheme very efficient. The purpose of this paper is to show the security level performance of our scheme and show its ability to resist the brute-force attack of an unauthorized prover.\",\"PeriodicalId\":180043,\"journal\":{\"name\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEEC.2004.1374429\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEEC.2004.1374429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The performance of an efficient zero-knowledge identification scheme
Fiat and Shamir have proposed to use ZeroKnowledge interactive proofs to obtain secure identification mechanisms. Zero-Knowledge protocols are designed to address the identification service, by allowing a prover to demonstrate knowledge of a secret while revealing no information to be use by the verifier to convey the demonstration of knowledge to others. The invention of an efficient Zero-Knowledge identification scheme has provided anther public-key cryptosystem besides the renowned Fiat-Shamir scheme, for which in addition to the identification feature both key exchange and mutual identification are available. The availability of the elliptic curve discrete logarithm problem made the invented scheme very efficient. The purpose of this paper is to show the security level performance of our scheme and show its ability to resist the brute-force attack of an unauthorized prover.