On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries
From MaRDI portal
Publication:5504560
DOI10.1007/978-3-540-89994-5_1zbMath1178.94186OpenAlexW1590314524MaRDI QIDQ5504560
Publication date: 22 January 2009
Published in: Mathematical Methods in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89994-5_1
Related Items (3)
Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme ⋮ OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss ⋮ On the security of a modified Beth identity-based identification scheme
This page was built for publication: On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries