Research Article

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

Algorithm 4

Description of the Simulator solving an instance of the discrete logarithm problem with the help of impersonator as subroutine.
SETUP
(1)  ;
(2)  ;
(3)  ; ;
(4)  , ; ;
(5)  ;
(6)  
(7)  :
 (i) ;
 (ii) , ;
 (iii) , , ;
 (iv) ;
 (v) ;
 (vi) ;
 (vii) ;
 (viii) ;
 (ix) ;
(8)  :
 (i) ;
 (ii) ;
 (iii) ;
(9)  :
 (i) ;
 (ii) ;
 (iii) ;
 (iv) ,
 (v)
 (vi)
 (vii) , , , ;
 (viii)
 (ix)
 (x) ;
Phase 1
(10)  : , , ;
Phase 2
(11)  ;
(12)  , : , , ;
(13)  RESET CP;
(14)  , : , , ;
(15)  ;
(16)  ;
(17)  ;
(18)  ;
(19)   ;
(20)  ;
(21)  ;