Skip to main content

Fiat–Shamir Identification Protocol And The Fiat–Shamir Signature Scheme

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 283 Accesses

Introduction

There are several variants of the Fiat–Shamir identification protocol. One way to classify these is based on the number of secrets. In the basic one [4] each prover knows only one secret. Another is to distinguish between identity based and public key based ones. In both, a trusted center made public \(n=p\cdot q\) such that p and q are secret a prime numbers only known to the center.

In the identity based system [3, p. 152] (see also [2, 4, 5]) a trusted center gives each user a secret key, partially based on biometrics. In particular, to receive an identity from the trusted center, Alice goes to the center. There her fingerprints and, other biometrics information is collected and her identity verified. I is the string which contains: Alice's identity (name), Alice's biometrics, and other information to identify Alice uniquely. The center chooses k small \(j_{ i}, 1\leq i\leq k,\) such that \(x_i:=f (I,j_{ i})\) are quadratic residues modulo n, where fis a public...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Burmester, M.V.D. and Y.G. Desmedt (1989). “Remarks on the soundness of proofs.” Electronics Letters, 25 (22), 1509–1511.

    MATH  Google Scholar 

  2. Fiat, A. and A. Shamir (1987). “How to prove yourself: Practical solutions to identification and signature problems.” Advances in Cryptology—CRYPTO'86, Lecture Notes in Computer Science, vol. 263, ed. A. Odlyzko. Springer-Verlag, Santa Barbara, CA.

    Google Scholar 

  3. Fiat, A. and A. Shamir (1987). “Unforgeable proofs of identity.” Securicom 87, March 4–6, 1987, Paris, France, 147–153.

    Google Scholar 

  4. Shamir, A. (1986). “Interactive identification.” Presented at the Workshop on Algorithms, Randomness and Complexity, Centre International de Rencontres Mathématiques (CIRM), Luminy (Marseille), France.

    Google Scholar 

  5. Shamir, A. (1987). “The search for provably secure identification schemes.” Proceedings of the International Congress of Mathematicians, August 3–11, 1987, Berkeley, CA, USA, 1488–1495.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Desmedt, Y. (2005). Fiat–Shamir Identification Protocol And The Fiat–Shamir Signature Scheme. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_162

Download citation

Publish with us

Policies and ethics