When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the prover has to respond to a series of challenges fr...

Full description

Bibliographic Details
Main Authors: Asghar Hassan Jameel, Kaafar Mohamed Ali
Format: Article
Language:English
Published: De Gruyter 2017-10-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2015-0059