An efficient identification protocol secure against concurrent-reset attacks

In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [Bellare, Fischlin, Goldwasser, and Micali, Identification protocols secure against reset attacks: 495–511, Springer...

Full description

Bibliographic Details
Main Authors: Wu J., Stinson D. R.
Format: Article
Language:English
Published: De Gruyter 2009-12-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/JMC.2009.021