Abstract
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital since the communication may be impersonated. Tea and Ariffin, in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP) that proved secure against impersonation under passive, active and concurrent attacks via the BFHP-hardness assumption. In this paper, we upgrade the ID scheme and improve some of its settings. Next, we provide the security proof against impersonation under active and concurrent attacks in the random oracle model via the hardness assumption of the One-More BFHP. Finally, we include an additional discussion about the computational efficiency of the upgraded ID scheme based on BFHP and present its comparison with other selected ID schemes.
1. Introduction
Symmetric cryptography allows users to perform encryption and decryption using the identical pre-established secret key. It enables simpler and quicker encryption since users do not have to authenticate the agreed secret key from any authority like those in public-key cryptography. Current practical symmetric-key algorithms include the Data Encryption Standard (DES) such as 3DES and the widely used Advanced Encryption System (AES) such as AES-128, AES-192, and AES-256, which target block ciphers. In contrast, RC4 deals with stream cipher in its symmetric encryption. Besides having a faster encryption speed, AES-256, in particular, is considered to be quantum resistant. Although faster and having a more secure encryption than public-key cryptography, identifying the honest users over the virtual network is crucial prior to initiating the encryption. As impersonation by an unauthorized entity may occur during the communication, both users should identify and prove to each other that they possess the same secret key before the encryption begins.
The main objective of an identification (ID) scheme is to enable an entity to prove and verify that it knows a secret to another entity without having to reveal it during the interaction. The protocol commonly begins with the commitment initiated by the prover that binds the interaction. Next, a challenge issuance by the verifier to the prover. Finally, a prover’s responses to the challenge, followed by the verification and decision output by the verifier.
The first ID scheme [1] utilized the quadratic residuosity (QR) or square root modulo as their fundamental primitive. Its security rests on the difficulty of solving the integer factorization problem (IFP). Later, ref. [2] presented an ID scheme using the RSA encryption technique in the protocol with underlying security associated with the hardness of solving the eth-root of RSA. In the subsequent year, another novel ID scheme [3] featured the utilization of the discrete logarithm problem (DLP) in the design. However, the concrete proof of security in cryptography was formally described only after 2000s. Many ID schemes were then proposed based on various primitives and their variants surrounding IFP and DLP. For example, the elliptic curve discrete logarithm (ECDLP) in [4] and the bilinear Diffie-Hellman (BDH) problem in [5] with their security proofs in the standard model.
Besides number-theoretic problems, there are non-number-theoretic problems from the NP-class were utilized in designing ID schemes, such as in [6,7,8], to name a few. Furthermore, some of the design proposals from these problems are categorized as post-quantum candidates. For instance, the multivariate quadratic (MQ) polynomial as in [9] relies on the intractability of the MQ polynomial. On the other hand, the lattice-based identification schemes proposed, respectively, [10,11] consider the hardness of solving the shortest vector problem (SVP) in lattices. The recently proposed code-based ID scheme by [12] features the hardness assumption of solving a variant of a syndrome decoding (SD) problem.
Ref. [13] in 2013 proposed an ID scheme based on the Diophantine Equation Hard Problem (DEHP), which claimed to be secure against impersonation under passive attack via the hardness assumption of DEHP. However, by carefully choosing the correct interval of the solutions of DEHP, successful impersonation is possible even without knowing the secret parameters, which results in acceptance with non-negligible probability. Later, ref. [14] proposed a new ID scheme based on the Bivariate Function Hard Problem (BFHP), a specific problem of two variables derived from DEHP [15]. With the hardness assumption of solving the BFHP to obtain the preferred private solution, the proposed ID scheme was proven secure against impersonation under passive, active and concurrent attacks.
In this paper, we upgrade the ID scheme based on BFHP from [14]. First, we refine the definition of the Bivariate Function Hard Problem (BFHP) and its underlying hardness assumption of One-More BFHP. Next, we present the upgraded ID scheme and the corresponding security proof against impersonation under active and concurrent attacks in the random oracle model via the difficulty of solving the One-More BFHP. Finally, we add on some efficiency analyses about our upgraded ID scheme.
The layout of the paper is as follows. Section 2 reviews preliminaries related to the ID scheme and its security model. Next, we outline the upgraded ID scheme based on BFHP, and formally describes the security proof of our ID scheme against impersonation under active and concurrent attacks in the random oracle model in Section 3. Section 4 includes a discussion about the efficiency of ID schemes. Lastly, we draw our conclusion in Section 5.
2. Preliminaries
2.1. Mathematical Background
This section reviews the Bivariate Function Hard Problem (BFHP) and all the related essential works to our proposal. We begin with the famous theorem due to Minkowski and its implication for the solution of modular linear equations [16].
Theorem 1.
(Minkowski). In an ω-dimensional lattice L, there exists a non-zero vector υ with
Ref. [16] addressed the problem of solving modular linear equation
for some N with unknown factorization. Although such an equation has infinitely many solutions of , one can expect a unique solution if , where is the upper bound of each solution for . This unique solution can be recovered heuristically by computing the shortest vector in an m-dimensional lattice. In addition, if in turn , then the linear equation has many solutions, which are exponential in the bit-size of N, and one has no hope of improving the bound in general. That is, there exists no efficient algorithm to output all the roots in polynomial time.
Next, we lay out the definition of BFHP from the previous work in [14], and further refine the hardness of the bivariate function and its corresponding assumption. We firstly review the proper analytic description related to BFHP.
Proposition 1.
Let be a multiplicative one-way function that maps for some . Let and be such functions (either identical or non-identical) such that , and . Let . Let . Let where is exponentially large for any probabilistic polynomial time (PPT) adversary to sieve through all possible answers, then it is infeasible to determine over from .
Proof.
To prove that solving the Diophantine equation given by is infeasible, consider the general solution for given by and for any , where and are initial solutions for the linear Diophantine equation . Then is said to be solved when the private preferred solution pair is found within the stipulated interval . In other words, one must search for specific integer j such that holds, that is . This gives, .
Then the difference between the upper and the lower bounds of j is approximately . Since where is exponentially large for any probabilistic polynomial time (PPT) adversary to sieve through all possible answers. We conclude that the difference is very large, and finding the correct j is infeasible. This applies to the case of v too. □
We put forward an example to demonstrate the hardness of finding the preferred private solution from the exponentially many choices of j.
Example 1.
Let and . Let u = 41,234 and v = 52,167, then 19,821,937. Here we take and . We now construct the parametric solutions for this BFHP. The initial points are = 118,931,622 and 99,109,685. Then general parametric solutions are and . There are approximately , about values of j to try (i.e., the difference between upper and lower bounds), while at minimum, the value of . In fact, the correct value is 519,172 .
Definition 1.
(Bivariate Function Hard Problem (BFHP)). Let be a bivariate function where are unknown integers of n-bits, are public m-bits integers with and is exponentially large for . Given , the BFHP is the problem in identifying the unique solution pair which is known as the preferred private solution.
Definition 2.
(BFHP Assumption). Suppose a BFHP experiment with parameter generator , algorithm and security parameter (i.e., security parameter of length n written in unary [17]) is defined as follows:
- 1
- Runs to obtain .
- 2
- Choose such that .
- 3
- is given and outputs .
- 4
- The output of the experiment is defined to be 1, i.e., if with correct preferred private solution pair . Otherwise defined to be 0.
Then the BFHP is hard relative to if for all probabilistic polynomial-time algorithm , there exists a negligible function such that,
Definition 3.
(One-More BFHP). Let be a bivariate function with such that and . An adversary is given a challenge oracle that produces a random integer when queried and BFHP oracle that provides the preferred private primitives correspond to the query . The adversary is said to win if after i queries to , it can solve all the i challenges with strictly at most queries to the . Take note that .
2.2. Identification Scheme and Security Model
An ID scheme comprises triple probabilistic polynomial-time algorithms, described as a series of challenge-and-response interactions between two entities: the Prover and the Verifier.
- Setup: On input of security parameter , the algorithm generates public system and secret parameters. On termination, it publicizes the public system parameters and keeps the secrets securely.
- Prove: A probabilistic algorithm that firstly outputs a random commitment to bind the interaction and subsequently replies to the challenge via a response .
- Verify: A probabilistic algorithm that firstly outputs a random challenge to the bound commitment and next output decision based on the received response.
The security of an ID scheme lies in the advantage of an adversary (impersonator) being accepted after a certain number of interactions, either passively or actively. This is often described as a two-phase impersonation game between adversary and simulator. We outline the model to define an adversary’s advantage in the security game.
- Setup: A simulator takes in the security parameter and generates random public system and secret parameters. The public system parameters are given to the adversary while secrets are kept securely.
- Phase 1 (Training): The adversary undergoes training based on different attackers’ environments: (i) Passive: Adversary queries to the simulator, returned with valid conversation transcripts containing information about commitment, challenge, and response. (ii) Active and concurrent: Adversary takes the role of the cheating verifier and requests the simulator to prove itself. This environment works exactly like in the ID protocol.
- Phase 2 (Impersonation): The adversary now acts as a cheating prover. It outputs a commitment that it wishes to impersonate. The impersonation is said to be successful if the adversary can convince the simulator and results in acceptance of the decision.
Definition 4.
An ID scheme is defined to be -secure against impersonation under passive, active or concurrent attacks if an adversary who runs the ID protocol in time t and makes at most queries has the negligible advantage such that
where .
Lastly, we address the Reset Lemma by [18], which provides a better bound and simpler proof in relating two probabilities in the security game of an ID scheme. Under resetting the challenge by the verifier, the cheating prover yields two valid conversation transcripts that convince the verifier to accept him.
Lemma 1.
(Reset Lemma). Let P be a prover in a canonical ID protocol with V a verifier represented by , and be inputs for the prover P and verifier V, respectively. Let be the probability that V accepts in its interaction with P, i.e.,
and be the probability that V accepts its interaction with P in the reset game, i.e.,
Then,
where .
Proof.
See [18]. □
3. Results: The Design and Security Analysis
3.1. Efficient Identification Scheme Based on BFHP
This section presents the ID scheme based on BFHP by [14] with some upgrades to improve the setting. Two new hash functions are introduced in the Algorithm 1, with one used to mask the secret, and the other used for integrity check purposes.
| Algorithm 1 Modified ID Scheme Based on BFHP. |
Input: Security parameter . Output: System parameters . Setup:
Identification Protocol:
|
Proof of correctness.
Since and , it is easy to verify for , the resulting produces a valid . For the case of , since from Setup: 3(c), we have
that produces a valid . □
Remark 1.
The public system parameters are protected by Theorem 1 since the sizes of are of and the product and . This results infinitely many solutions to the linear equation in which finding the correct preferred private solutions of and are infeasible. This is indeed the BFHP defined in Definition 1
Remark 2.
It is the prover’s main objective to prove that he knows the secret x (i.e., step 3 in the identification protocol) without relaying it to the verifier. Since the published public system parameters contain secret parameters of , it should be infeasible for an adversary to extract from . Observe that from Setup:
each individual equation has the secret parameters protected by the BFHP with three unknown variables . If these secret variables are solved from the public system parameters, then the preferred private solution is found.
Remark 3.
In this case, one can treat all (or part of) the secret parameters as the agreed symmetric keys (cipher keys) between two users. Once both users succeed in identifying each other that they acquired the identical secret keys, they can next perform encryption using some practical symmetric encryption available.
3.2. Security Proof of The Identification Scheme Based on BFHP
In this section, we construct the security proof of the upgraded ID scheme based on BFHP with the refined One-More BFHP assumption (Definition 3). We considers the security against impersonation under active and concurrent attacks as this is a more relevant and stronger security notion. In addition, we refer to the Reset Lemma [18] for the probability analysis.
Theorem 2.
Let be the advantage of impersonation under active and concurrent attacks by impersonator , and be the advantage of algorithm solving the One-More BFHP. Then the identification scheme based on BFHP is -secure against impersonation under active and concurrent attacks in the random oracle model if solving the One-More BFHP is -hard where:
with denotes the number of identification queries.
Proof.
We assume that if there exists an Impersonator who can -break the scheme, then there exists an efficient probabilistic polynomial-time algorithm that can -solve the One-More BFHP. attempts to simulate a challenger for .
- 1.
- Setup: firstly access to which output the following initial challenge set:together with two hash functions and . The public system parameters is passed to . These is then sent to , with and modeled as random oracles controlled by . Note that does not know the secret parameters of .
- 2.
- Query phase: The interaction between and involves the simulation of random oracles and identification queries.
- (a)
- Random oracle query: initially prepare two empty lists of -list and -list, which function to receive and reply queries from .
- i
- -list: This list has the form of . When queries , checks whether such is in the list. If it does, it replies it to . Otherwise, randomly samples and replies it to . Lastly, stores the new pair of into -list.
- ii
- -list: This list is in the form of . When queries , checks if such exists. If it does, it replies it to . Otherwise, randomly chooses and replies it to . lastly stores the new pair of into -list.
Notice that simulates the above two random oracle queries perfectly, as both the replied answers are uniformly distributed. - (b)
- Identification query: acts as cheating verifier and requests to prove itself:
- i
- Commitment: Upon query by , query for random challenge of and replies to .
- ii
- Challenge: outputs a random challenge upon receiving and sends it to .
- iii
- Response: After receiving the challenge c from , queries such that to the which replied with a response and . This is then sent to . next increases k by 1.
Referring to the Response query above, the queried by can be re-expressed asSince , there are two possible cases, i.e., - 3.
- Impersonation phase: Now, behaves as cheating prover and tries to convince to accept it.
- (a)
- Commitment: sends commitment in which he wishes to impersonate to .
- (b)
- Challenge: checks if , then it outputs a random challenge to . Otherwise, it aborts.
- (c)
- Response: replies the challenge with response and its corresponding signature to . checks and verifies the correctness of signature .
Via resetting to two different challenges and , then obtains two valid transcripts of and . The validity of the received transcripts can be verified through the protocol, next search through the -list for the that produced the valid signature for . If such is found, then proceed to search the -list for the corresponding . This enables to extract the secret which has the probability at least following the Reset Lemma [18].This further enables to compute which finally used to solve all for , i.e.,From this point, has successfully output all the solutions to challenges of by querying only t queries of to . This completes the simulation. - 4.
- Probability study: The probability for the ID scheme against impersonation under active and concurrent attacks rests on winning the game, i.e., the successful impersonation by that yield in acceptance which enables to extract the secret. Consider the following possible scenarios:
- (a)
- Regardless of whether the game aborts, guesses the correct from the interval of that output the solutions to the One-More BFHP. The corresponding probability to such an event is therefore
- (b)
- The game does not abort, and found the corresponding secret from the queried -list that solves the One-More BFHP. This implies that successfully found the solution to the One-More BFHP with strictly less queries to than to . Via Reset Lemma,
Since , putting everything mathematically, we haveIn other words, we haveand that
This completes the security proof of the upgraded ID scheme. □
4. Discussion
4.1. Computational Cost of The Efficient Identification Scheme Based on BFHP
We analyze the efficiency of the ID scheme based on BFHP, considering the computational cost and its asymptotic complexity order. As the ID scheme mainly consists of simple arithmetic and modular addition and multiplication operations, Table 1 shows the corresponding computational costs for each algorithm. The scheme does not involve modular exponentiation operation, and hence its asymptotic complexity order is bounded only by , due to modular multiplication and inversion operations.
Table 1.
Computational cost of the upgraded ID scheme based on BFHP.
4.2. Comparative Analysis
We next compare our ID scheme with the five selected well-known ID schemes by [1,2,3,9,10]. Our choice is that the former three ID schemes were among the pioneered ID schemes that are number-theoretic based, i.e., quadratic residuosity, -the root of RSA, and discrete logarithm problem, respectively. The latter two featured post-quantum primitives of non-number theoretic type, i.e., shortest vector problem (SVP) in lattice and multivariate quadratic (MQ) polynomial. To simplify the comparison, we tabulated all the abovementioned ID schemes by considering total computational costs and their asymptotic complexity orders in Table 2.
Table 2.
Comparative analysis of selected ID schemes for selected aspects.
As the reader may notice from Table 2, we do not include asymptotic complexity orders for the ID scheme by [9] as its efficiencies rely on the system parameters, such as the size of public-private keys and the number of rounds performed. Readers may refer to Section 5.2 [9] for a detailed discussion.
Each of the selected ID schemes in our comparative analysis has its strengths and practical value. The first three ID schemes [1,2,3] based on number-theoretic hard problems are well-established. In comparison, the subsequent two ID schemes [9,10] are constructed using well-agreed post-quantum primitives, which have recently gained much attention in the field. While the primitive used in our ID scheme based on BFHP is immature in that it is not widely studied, it can nevertheless be practical if more research is conducted on it in the future. One benefit of considering BFHP is that it allows two secrets in a single mathematical equation, i.e., and with many possible solutions, different from the conventional mathematical hard problems that permit only single and unique solution. Furthermore, the simpler mathematical structure comprising only modular additions and multiplications significantly reduces the computation time compared to those involving modular exponentiation operations. Hence, besides utilizing it in public-key cryptography (the proposed ID scheme in this paper), such secrets can be used in symmetric encryption schemes.
5. Conclusions
In this paper, we upgraded the ID scheme based on BFHP by [14]. We proved the security of the upgraded ID scheme against impersonation under active and concurrent attacks via the assumption that solving the One-More BFHP is difficult. In addition, the upgraded ID scheme is efficient as it does not involve mathematical operations with higher computational complexity. This is evident in the significant speed-up of the algorithm vis-à-vis the data size transmitted and the simplicity of the mathematical structure for practical deployment, which would give better efficient throughput over the bandwidth. This is clearly explained in Table 2. Once the fundamental security is proven to be secure with desirable characteristics for practical deployment, the next natural way forward would be to analyze physical attacks such as timing attacks, power analysis, power consumption attacks, side-channel analysis, and other directions.
Author Contributions
Conceptualization, B.C.T. and M.R.K.A.; methodology, B.C.T. and M.R.K.A.; validation, M.R.K.A.; formal analysis, B.C.T.; investigation, B.C.T., M.R.K.A., A.H.A.G., S.H.S. and M.A.M.J.; resources, M.R.K.A.; writing—original draft preparation, B.C.T.; writing—review and editing, B.C.T., M.R.K.A., A.H.A.G., S.H.S. and M.A.M.J.; visualization, B.C.T., M.R.K.A., A.H.A.G., S.H.S. and M.A.M.J.; supervision, M.R.K.A.; project administration, M.R.K.A.; funding acquisition, M.R.K.A. All authors have read and agreed to the published version of the manuscript.
Funding
The present research was partially supported by the Universiti Putra Malaysia Grant with Project Number GP-IPS/2018/9657300. It is also partially supported by Mediterranea Universiti of Reggio Calabria (UNIRC) Research Grant (UPM/INSPEM/700-3/1/GERANANTARABANGSA/6380071-10065).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The first author would like to further express appreciation to the Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia (UPM), and Ministry of Higher Education (MOHE) for giving the opportunity to conduct this research.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| BDH | Bilinear Diffie-Hellman |
| BFHP | Bivariate Function Hard Problem |
| Challenge | |
| Commitment | |
| DEHP | Diophantine Equation Hard Problem |
| (EC)DLP | (Elliptic Curve) Discrete Logarithm Problem |
| ID | Identification |
| IFP | Integer Factorization Problem |
| Impersonation under active attack/concurrent attack | |
| MQ | Multivariate Quadratic |
| NP | Nondeterministic Polynomial |
| QR | Quadratic Residuosity |
| RSA | Rivest-Shamir-Adleman |
| SD | Syndrome Decoding |
| SVP | Shortest Vector Problem |
| Response |
References
- Fiat, S.; Shamir, A. How to Prove Yourself: Practical Solutions to Identification and Signature Problem. In Proceedings of the Advances in Cryptology, CRYPTO’86, Santa Barbara, CA, USA, 11–15 August 1986; Volume 263, pp. 186–194. [Google Scholar] [CrossRef] [Green Version]
- Guillou, L.; Quisquater, J.J. A “Paradoxical ”Identity-Based Signature Scheme Resulting from Zero Knowledge. In Proceedings of the Advances in Cryptology, CRYPTO’88, Santa Barbara, CA, USA, 21–25 August 1988; Volume 403, pp. 216–231. [Google Scholar]
- Schnorr, C.P. Efficient Identification and Signature for Smart Card. In Proceedings of the Advances in Cryptology, CRYPTO’89, Santa Barbara, CA, USA, 20–24 August 1989; Volume 435, pp. 239–252. [Google Scholar]
- Popescu, C. An Identification Scheme Based on The Elliptic Curve Discrete Logarithm Problem. In Proceedings of the Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region, Beijing, China, 14–17 May 2000; Volume 2, pp. 624–625. [Google Scholar]
- Kim, M.; Kim, K. A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. In Proceedings of the Information Security and Privacy, Melbourne, Australia, 3–5 July 2002; Volume 2384, pp. 362–378. [Google Scholar]
- Shamir, A. An Efficient Identification Scheme Based on Permuted Kernels (extended abstract). In Proceedings of the Advances in Cryptology, CRYPTO’89, Santa Barbara, CA, USA, 20–24 August 1989; Volume 435, pp. 606–609. [Google Scholar]
- Stern, J. A New Identification Scheme Based on Syndrome Decoding. In Proceedings of the Advances in Cryptology, CRYPTO’93, Santa Barbara, CA, USA, 22–26 August 1993; Volume 773, pp. 13–21. [Google Scholar]
- Pointcheval, D. A New Identification Scheme Based on the Perceptrons Problem. In Proceedings of the Advances in Cryptology, EUROCRYPT’95, St. Malo, France, 21–25 May 1995; Volume 921, pp. 319–328. [Google Scholar]
- Sakumoto, K.; Shirai, T.; Hiwatari, H. Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials. In Proceedings of the Advances in Cryptology, CRYPTO 2011, Santa Barbara, CA, USA, 14–18 August 2011; Volume 6841, pp. 706–723. [Google Scholar]
- Lyubashevsky, V. Lattice-Based Identification Schemes Secure Under Active Attacks. In Proceedings of the Public Key Cryptography, PKC 2008, Barcelona, Spain, 9–12 March 2008; Volume 4939, pp. 162–179. [Google Scholar]
- Akleylek, S.; Soysaldı, M. A New 3-pass Zero-Knowledge Lattice-Based Identification Scheme. In Proceeding of 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey, 11–15 September 2019; pp. 409–413. [Google Scholar]
- Bettaieb, S.; Bidoux, L.; Blazy, O.; Gaborit, P. Zero-Knowledge Reparation of the Véron and AGS Code-Based Identification Schemes. In Proceedings of the 2021 IEEE International Symposium on Information Theory (ISIT), Virtual, 12–20 July 2021; pp. 55–60. [Google Scholar]
- Tea, B.C.; Ariffin, M.R.K.; Chin, J.J. An Efficient Identification Scheme in Standard Model Based on the Diophantine Equation Hard Problem. Malays. J. Math. Sci. 2013, 7, 87–100. [Google Scholar]
- Tea, B.C.; Ariffin, M.R.K. An Identification Scheme Based on Bivariate Function Hard Problem. In Proceedings of the 4th International Cryptology and Information Security Conference (CRYPTOLOGY2014), Putrajaya, Malaysia, 24–26 June 2014; pp. 48–56. [Google Scholar]
- Ariffin, M.R.K.; Asbullah, M.A.; Abu, N.A.; Mahad, Z. A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem of N = p2q. Malays. J. Math. Sci. 2013, 7, 19–37. [Google Scholar]
- Herrmann, M.; May, A. Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. In Proceedings of the Advances in Cryptology, ASIACRYPT 2008, Melbourne, Australia, 7–11 December 2008; Volume 5350, pp. 406–424. [Google Scholar]
- Katz, J.; Lindell, Y. Introduction to Modern Cryptography (Cryptography and Network Security Series), 2nd ed.; Chapman & Hall/CRC: Boca Raton, FL, USA, 2015; pp. 312–320. [Google Scholar]
- Bellare, M.; Palacio, A. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In Proceedings of the Advances in Cryptology, CRYPTO 2002, Santa Barbara, CA, USA, 18–22 August 2002; Volume 2442, pp. 162–177. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).