Abstract
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly, the rationale behind the need for Identification Protocols is discussed. Secondly, we examine, in detail, challenge-response protocols, based upon zero-knowledge proofs, that form a subset of Identification Protocols in general. Thirdly, the mathematical tools necessary for the understanding of how these protocols work is given. Finally, we discuss four main Identification Protocols: Fiat-Shamir, Feige-Fiat-Shamir, Schnorr and Guillou- Quisquater. This discussion includes the theory, practical examples and the security aspects of each protocol.
Recommended Citation
O’Donnell, Michael
(2002)
"Identification Protocols in Cryptography,"
The ITB Journal:
Vol. 3:
Iss.
1, Article 3.
doi:10.21427/D7WW54
Available at:
https://arrow.tudublin.ie/itbj/vol3/iss1/3
DOI
10.21427/D7WW54