GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks

@inproceedings{Bellare2002GQAS,
  title={GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks},
  author={Mihir Bellare and Adriana Palacio},
  booktitle={CRYPTO},
  year={2002}
}
The Guillou-Quisquater (GQ) and Schnorr identification schemes are amongst the most efficient and best-known Fiat-Shamir follow-ons, but the question of whether they can be proven secure against impersonation under active attack has remained open. This paper provides such a proof for GQ based on the assumed security of RSA under one more inversion, an extension of the usual one-wayness assumption that was introduced in [5]. It also provides such a proof for the Schnorr scheme based on a… CONTINUE READING

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 236 CITATIONS

Anonymous Authentication Scheme with Decentralized Multi-Authorities

  • 2017 IEEE International Conference on Smart Computing (SMARTCOMP)
  • 2017
VIEW 8 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures

  • IACR Cryptology ePrint Archive
  • 2018
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

On the Provable Security of Two-Round Multi-Signatures

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

On the Security of Classic Protocols for Unique Witness Relations

  • Public Key Cryptography
  • 2018
VIEW 8 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

Optimal Security Proofs for Signatures from Identification Schemes

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

How to construct identity-based signatures without the key escrow problem

Tsz Hon Yuen, Willy Susilo, Yi Mu
  • International Journal of Information Security
  • 2009
VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2001
2019

CITATION STATISTICS

  • 20 Highly Influenced Citations

  • Averaged 12 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

Zero-knowledge proofs of identity

  • Journal of Cryptology
  • 1987
VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL

GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks

M. Bellare, A. Palacio
  • Preliminary version of this paper, Advances in Cryptology – CRYPTO
  • 2002