首页> 外文期刊>電子情報通信学会技術研究報告. 情報理論. Information Theory >A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
【24h】

A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks

机译:A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks

获取原文
获取原文并翻译 | 示例
           

摘要

We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fact, keeping efficiency as an interactive proof, it needs only 2-round interaction. Moreover, based on tight reduction to the Gap Computational Diffie-Hellman Assumption, and without the random oracle, it is secure against concurrent man-in-the-middle attacks. Our scheme has a prototype scheme similar to half the operation of Diffie-Hellman Key-Exchange. The prototype is secure only against two-phase concurrent attacks based on stronger assumptions. Applying tag technique and employing a one-time signature in the prototype, we get the preferable scheme above.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号