We describe a lightweight algorithm performing whole-network authentication in a distributed way. This protocol is more efficient than one-to-one node authentication: it results in less… (More)
We introduce “thrifty” zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security… (More)
In the Micali-Shamir paper [7] improving the efficiency of the original Fiat-Shamir protocol [5,6,9], the authors state that “(. . .) not all of the vi’s will be quadratic residues mod n. We overcome… (More)