Research Article
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
Table 2
Comparison of the identification protocol with other discrete logarithm IBI schemes.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
U: usk components, E: exponentiation, MG: multiplication in , MZ: multiplication in , IMP-AA/CA: security assumption against impersonation under active and concurrent attack, DLP: discrete logarithm problem, OMDL: one-more discrete logarithm problem, and DDHP: decisional Diffie-Hellman problem, . |