2023
DOI: 10.3390/math11051139
|View full text |Cite
|
Sign up to set email alerts
|

Rank AGS Identification Scheme and Signature Scheme

Abstract: The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an identification scheme into a signature scheme which can be used for achieving security purposes and cryptographic purposes, especially for authentication. In this paper, we recall an identification protocol, namely the RankID scheme, and show that the scheme i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
(27 reference statements)
0
1
0
Order By: Relevance
“…Stern [21] , Veron [23] , and CVE [6] are examples of signature schemes that were constructed via this method in the setting of the Hamming metric. Similarly, transformation can be adapted in the rank metric setting to construct signature schemes such as rank Stern [9] , rank Veron and rank CVE [3] , cRVDC [4] and rank AGS [15] .…”
Section: Introductionmentioning
confidence: 99%
“…Stern [21] , Veron [23] , and CVE [6] are examples of signature schemes that were constructed via this method in the setting of the Hamming metric. Similarly, transformation can be adapted in the rank metric setting to construct signature schemes such as rank Stern [9] , rank Veron and rank CVE [3] , cRVDC [4] and rank AGS [15] .…”
Section: Introductionmentioning
confidence: 99%