Introduction
There are several variants of the Fiat–Shamir identification protocol. One way to classify these is based on the number of secrets. In the basic one [4] each prover knows only one secret. Another is to distinguish between identity based and public key based ones. In both, a trusted center made public \(n=p\cdot q\) such that p and q are secret a prime numbers only known to the center.
In the identity based system [3, p. 152] (see also [2, 4, 5]) a trusted center gives each user a secret key, partially based on biometrics. In particular, to receive an identity from the trusted center, Alice goes to the center. There her fingerprints and, other biometrics information is collected and her identity verified. I is the string which contains: Alice's identity (name), Alice's biometrics, and other information to identify Alice uniquely. The center chooses k small \(j_{ i}, 1\leq i\leq k,\) such that \(x_i:=f (I,j_{ i})\) are quadratic residues modulo n, where fis a public...
References
Burmester, M.V.D. and Y.G. Desmedt (1989). “Remarks on the soundness of proofs.” Electronics Letters, 25 (22), 1509–1511.
Fiat, A. and A. Shamir (1987). “How to prove yourself: Practical solutions to identification and signature problems.” Advances in Cryptology—CRYPTO'86, Lecture Notes in Computer Science, vol. 263, ed. A. Odlyzko. Springer-Verlag, Santa Barbara, CA.
Fiat, A. and A. Shamir (1987). “Unforgeable proofs of identity.” Securicom 87, March 4–6, 1987, Paris, France, 147–153.
Shamir, A. (1986). “Interactive identification.” Presented at the Workshop on Algorithms, Randomness and Complexity, Centre International de Rencontres Mathématiques (CIRM), Luminy (Marseille), France.
Shamir, A. (1987). “The search for provably secure identification schemes.” Proceedings of the International Congress of Mathematicians, August 3–11, 1987, Berkeley, CA, USA, 1488–1495.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Desmedt, Y. (2005). Fiat–Shamir Identification Protocol And The Fiat–Shamir Signature Scheme. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_162
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_162
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering