Scheme for authentication of at least one prover by a verifier

作者: Jacques Stern

DOI:

关键词:

摘要: A new procedure for authentication of at least one prover by a verifier, the being based on public and secret key cryptographic techniques making use zero-knowledge protocol. In addition, this protocol is established using problem constrained linear equations finds applications in cryptography. This uses published matrix M dimension m×n where coefficients are chosen random from integers 0 to d-1, d generally prime number close square c. The "prover" authenticates itself "verifier" performing hashing functions randomly vector U m V n, results which called commitments sent prover. then chooses several predefined requests that verifier perform function. When receives result function, it compares with determine if has provided correct set responses. also can be repeated other vectors increased security.

参考文章(8)
Avi Wigderson, Michael Ben-Or, Joseph Kilian, Shafi Goldwasser, Multiprover interactive verification system ,(1988)
Kouici Sakurai, Verification method and apparatus ,(1992)
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017