메뉴 건너뛰기




Volumn 28, Issue 1, 2003, Pages 5-31

A new NP-complete problem and public-key identification

Author keywords

(permuted) perceptrons problem; NP complete problem; simulated annealing; zero knowledge identification

Indexed keywords


EID: 84867955018     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1021835718426     Document Type: Article
Times cited : (11)

References (46)
  • 1
    • 84867650223 scopus 로고
    • On the security of the permuted kernel identification scheme
    • Springer-Verlag Berlin
    • T. Baritaud, M. Campana, P. Chauvaud and H. Gilbert, On the security of the permuted kernel identification scheme, In Crypto '92, LNCS, Vol. 740 Springer-Verlag, Berlin (1992) pp. 305-311.
    • (1992) Crypto '92 , pp. 305-311
    • Baritaud, T.1    Campana, M.2    Chauvaud, P.3    Gilbert, H.4
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press New York
    • M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, In Proc. of the 1st CCS, ACM Press, New York (1993) pp. 62-73.
    • (1993) Proc. of the 1st CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 85043771050 scopus 로고
    • An interactive identification scheme based on discrete logarithms and factoring
    • Springer-Verlag Berlin
    • E. F. Brickell and K. S. McCurley, An interactive identification scheme based on discrete logarithms and factoring, In Eurocrypt '90, LNCS, Vol. 473 Springer-Verlag, Berlin (1991) pp. 63-71.
    • (1991) Eurocrypt '90 , pp. 63-71
    • Brickell, E.F.1    McCurley, K.S.2
  • 5
    • 0026627555 scopus 로고
    • An interactive identification scheme based on discrete logarithms and factoring
    • E. F. Brickell K. S. McCurley 1992 An interactive identification scheme based on discrete logarithms and factoring Journal of Cryptology 5 29 39
    • (1992) Journal of Cryptology , vol.5 , pp. 29-39
    • Brickell, E.F.1    McCurley, K.S.2
  • 6
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • Springer-Verlag Berlin
    • F. Chabaud, On the security of some cryptosystems based on error-correcting codes, In Eurocrypt '94, LNCS, Vol. 950 Springer-Verlag, Berlin (1995) pp. 131-139.
    • (1995) Eurocrypt '94 , pp. 131-139
    • Chabaud, F.1
  • 7
    • 85016692748 scopus 로고
    • On the existence of statistically hiding bit-commitment schemes and fail-stop signatures
    • Springer-Verlag Berlin
    • I. B. Damgård, T. P. Pedersen and B. Pfitzmann, On the existence of statistically hiding bit-commitment schemes and fail-stop signatures, In Crypto '93, LNCS, Vol. 773 Springer-Verlag, Berlin (1994) pp. 250-267.
    • (1994) Crypto '93 , pp. 250-267
    • Damgård, I.B.1    Pedersen, T.P.2    Pfitzmann, B.3
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions of identification and signature problems
    • Springer-Verlag Berlin
    • A. Fiat and A. Shamir, How to prove yourself: practical solutions of identification and signature problems, In Crypto '86, LNCS, Vol. 263 Springer-Verlag, Berlin (1987) pp. 186-194.
    • (1987) Crypto '86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 11
    • 0026732414 scopus 로고
    • Some remarks on the security of the identification scheme based on permuted kernels
    • J. Georgiades 1992 Some remarks on the security of the identification scheme based on permuted kernels Journal of Cryptology 5 2 133 137
    • (1992) Journal of Cryptology , vol.5 , Issue.2 , pp. 133-137
    • Georgiades, J.1
  • 12
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logarithms modulo a composite number
    • Springer-Verlag Berlin
    • M. Girault, An identity-based identification scheme based on discrete logarithms modulo a composite number, In Eurocrypt '90, LNCS, Vol. 473 Springer-Verlag, Berlin (1991) pp. 481-486.
    • (1991) Eurocrypt '90 , pp. 481-486
    • Girault, M.1
  • 13
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Springer-Verlag Berlin
    • M. Girault, Self-certified public keys, In Eurocrypt '91, LNCS, Vol. 547 Springer-Verlag, Berlin (1992) pp. 490-497.
    • (1992) Eurocrypt '91 , pp. 490-497
    • Girault, M.1
  • 14
    • 0346857377 scopus 로고
    • An identity-based identification scheme providing zero-knowledge authentication and authenticated key exchange
    • Springer-Verlag Berlin
    • M. Girault and J.-C. Paillès, An identity-based identification scheme providing zero-knowledge authentication and authenticated key exchange, In ESORICS '90, LNCS, Springer-Verlag, Berlin (1990) pp. 173-184.
    • (1990) ESORICS '90 , pp. 173-184
    • Girault, M.1    Paillès, J.-C.2
  • 15
    • 84955562814 scopus 로고
    • On the length of cryptographic hash-values used in identification schemes
    • Springer-Verlag Berlin
    • M. Girault and J. Stern, On the length of cryptographic hash-values used in identification schemes, In Crypto '94, LNCS, Vol. 839 Springer-Verlag, Berlin (1994) pp. 202-215.
    • (1994) Crypto '94 , pp. 202-215
    • Girault, M.1    Stern, J.2
  • 17
    • 85032868051 scopus 로고
    • How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design
    • Springer-Verlag Berlin
    • O. Goldreich, S. Micali and A. Wigderson, How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design, In Crypto '86, LNCS, Vol. 263 Springer-Verlag, Berlin (1987) pp. 171-185.
    • (1987) Crypto '86 , pp. 171-185
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 18
    • 0021941417 scopus 로고
    • The knowledge complexity of interactive proof systems
    • ACM Press New York
    • S. Goldwasser, S. Micali and C. Rackoff, The knowledge complexity of interactive proof systems, In Proc. of the 17th STOC, ACM Press, New York (1985) pp. 291-304.
    • (1985) Proc. of the 17th STOC , pp. 291-304
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 19
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Springer-Verlag Berlin
    • L. C. Guillou and J.-J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, In Eurocrypt '88, LNCS, Vol. 330 Springer-Verlag, Berlin (1988) pp. 123-128.
    • (1988) Eurocrypt '88 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 20
    • 0037519332 scopus 로고    scopus 로고
    • Practical and provably-secure commitment schemes from collision-free hashing
    • Springer-Verlag Berlin
    • S. Halevi and S. Micali, Practical and provably-secure commitment schemes from collision-free hashing, In Crypto '96, LNCS, Vol. 1109, Springer-Verlag, Berlin (1996) pp. 201-215.
    • (1996) Crypto '96 , pp. 201-215
    • Halevi, S.1    Micali, S.2
  • 22
    • 84966884014 scopus 로고
    • A smart card implementation of the fiat-shamir identification scheme
    • Springer-Verlag Berlin
    • H. J. Knobloch, A smart card implementation of the fiat-shamir identification scheme, In Eurocrypt '88, LNCS, Vol. 330 Springer-Verlag, Berlin (1988) pp. 87-95.
    • (1988) Eurocrypt '88 , pp. 87-95
    • Knobloch, H.J.1
  • 23
    • 84957698062 scopus 로고    scopus 로고
    • Cryptanalysis of an identification scheme based on the permuted perceptron problem
    • Springer-Verlag Berlin
    • L. Knudsen and W. Meier, Cryptanalysis of an identification scheme based on the permuted perceptron problem, In Eurocrypt '99, LNCS, Vol. 1592, Springer-Verlag, Berlin (1999) pp. 363-374.
    • (1999) Eurocrypt '99 , pp. 363-374
    • Knudsen, L.1    Meier, W.2
  • 25
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. Luby C. Rackoff 1988 How to construct pseudorandom permutations from pseudorandom functions SIAM Journal of Computing 17 2 373 386
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 26
    • 0003629991 scopus 로고
    • NIST Federal Information Processing Standards Publication (180-1), April
    • NIST, Secure Hash Standard (SHS), Federal Information Processing Standards Publication (180-1), April (1995).
    • (1995) Secure Hash Standard (SHS)
  • 27
    • 85031804925 scopus 로고
    • A modification of the fiat-shamir scheme
    • Springer-Verlag Berlin
    • K. Ohta and T. Okamoto, A modification of the fiat-shamir scheme, In Crypto '88, LNCS, Vol. 403 Springer-Verlag, Berlin (1989) pp. 232-243.
    • (1989) Crypto '88 , pp. 232-243
    • Ohta, K.1    Okamoto, T.2
  • 28
    • 33745972475 scopus 로고
    • Fast signature generation with a fiat-shamir-like scheme
    • Springer-Verlag Berlin
    • H. Ong and C. P. Schnorr, Fast signature generation with a fiat-shamir-like scheme, In Eurocrypt '90, LNCS, Vol. 473 Springer-Verlag, Berlin (1991) pp. 432-440.
    • (1991) Eurocrypt '90 , pp. 432-440
    • Ong, H.1    Schnorr, C.P.2
  • 30
    • 84947947515 scopus 로고
    • Improved agorithms for the permuted kernel problem
    • Springer-Verlag Berlin
    • J. Patarin and P. Chauvaud, Improved agorithms for the permuted kernel problem, In Crypto '93, LNCS, Vol. 773 Springer-Verlag, Berlin (1994) pp. 391-402.
    • (1994) Crypto '93 , pp. 391-402
    • Patarin, J.1    Chauvaud, P.2
  • 31
    • 3342923348 scopus 로고
    • Neural networks and their cryptographic applications
    • D. Pointcheval, Neural networks and their cryptographic applications, In Eurocode '94, INRIA (1994) pp. 183-193.
    • (1994) Eurocode '94, INRIA , pp. 183-193
    • Pointcheval, D.1
  • 32
    • 84957375922 scopus 로고
    • A new identification scheme based on the perceptrons problem
    • Springer-Verlag Berlin
    • D. Pointcheval, A new identification scheme based on the perceptrons problem, In Eurocrypt '95, LNCS, Vol. 921 Springer-Verlag, Berlin (1995) pp. 319-328.
    • (1995) Eurocrypt '95 , pp. 319-328
    • Pointcheval, D.1
  • 33
    • 84957794940 scopus 로고    scopus 로고
    • The composite discrete logarithm and secure authentication
    • Springer-Verlag Berlin
    • D. Pointcheval, The composite discrete logarithm and secure authentication, In PKC 2000, LNCS, Vol. 1151 Springer-Verlag, Berlin (2000) pp. 113-128.
    • (2000) PKC 2000 , pp. 113-128
    • Pointcheval, D.1
  • 34
    • 0031220276 scopus 로고    scopus 로고
    • A realistic security analysis of identification schemes based on combinatorial problems
    • G. Poupard 1997 A realistic security analysis of identification schemes based on combinatorial problems European Transactions on Telecommunications 8 5 471 480
    • (1997) European Transactions on Telecommunications , vol.8 , Issue.5 , pp. 471-480
    • Poupard, G.1
  • 35
    • 84957640282 scopus 로고    scopus 로고
    • Security analysis of a practical "on the fly" authentication and signature generation
    • Springer-Verlag Berlin
    • G. Poupard and J. Stern, Security analysis of a practical "on the fly" authentication and signature generation, In Eurocrypt '98, LNCS, Vol. 1403, Springer-Verlag, Berlin (1998) pp. 422-436.
    • (1998) Eurocrypt '98 , pp. 422-436
    • Poupard, G.1    Stern, J.2
  • 37
    • 84957796827 scopus 로고    scopus 로고
    • Short proofs of knowledge for factoring
    • G. Poupard J. Stern 2000 Short proofs of knowledge for factoring PKC 2000 1751 147 166
    • (2000) PKC 2000 , vol.1751 , pp. 147-166
    • Poupard, G.1    Stern, J.2
  • 38
    • 0003746279 scopus 로고
    • Ph.D. Thesis, Katholieke Universiteit Leuven, Departement Elektrotechniek, January
    • B. Preneel, Analysis and Design of Cryptographic Hash Functions, Ph.D. Thesis, Katholieke Universiteit Leuven, Departement Elektrotechniek, January (1993).
    • (1993) Analysis and Design of Cryptographic Hash Functions
    • Preneel, B.1
  • 39
    • 0003195066 scopus 로고
    • The MD5 Message-Digest Algorithm
    • The Internet Engineering Task Force, April
    • R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, The Internet Engineering Task Force, April (1992).
    • (1992) RFC 1321
    • Rivest, R.1
  • 40
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest A. Shamir L. Adleman 1978 A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 21 2 120 126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 41
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Springer-Verlag Berlin
    • C. P. Schnorr, Efficient identification and signatures for smart cards, In Crypto '89, LNCS,Vol. 435 Springer-Verlag, Berlin (1990) pp. 235-251.
    • (1990) Crypto '89 , pp. 235-251
    • Schnorr, C.P.1
  • 42
    • 85032871579 scopus 로고
    • An efficient identification scheme based on permuted kernels
    • Springer-Verlag Berlin
    • A. Shamir, An efficient identification scheme based on permuted kernels, In Crypto '89, LNCS, Vol. 435 Springer-Verlag, Berlin (1990) pp. 606-609.
    • (1990) Crypto '89 , pp. 606-609
    • Shamir, A.1
  • 43
    • 84947923743 scopus 로고    scopus 로고
    • On the security of a practical identification scheme
    • Springer-Verlag Berlin
    • V. Shoup, On the security of a practical identification scheme, In Eurocrypt '96, LNCS, Vol. 1070, Springer-Verlag, Berlin (1996) pp. 344-353.
    • (1996) Eurocrypt '96 , pp. 344-353
    • Shoup, V.1
  • 44
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • Springer-Verlag Berlin
    • J. Stern, A new identification scheme based on syndrome decoding, In Crypto '93, LNCS,Vol. 773 Springer-Verlag, Berlin (1994) pp. 13-21.
    • (1994) Crypto '93 , pp. 13-21
    • Stern, J.1
  • 45
    • 84995926594 scopus 로고
    • Designing identification schemes with keys of short size
    • Springer-Verlag Berlin
    • J. Stern, Designing identification schemes with keys of short size, In Crypto '94, LNCS, Vol. 839 Springer-Verlag, Berlin (1994) pp. 164-173.
    • (1994) Crypto '94 , pp. 164-173
    • Stern, J.1
  • 46
    • 0030283873 scopus 로고    scopus 로고
    • A new paradigm for public-key identification
    • J. Stern 1996 A new paradigm for public-key identification IEEE Transaction on Information Theory IT-42 1757 1768
    • (1996) IEEE Transaction on Information Theory , vol.42 , pp. 1757-1768
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.