Identity based identification from algebraic coding theory

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on numbertheoretic hard problems such as Discre...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, TAN, Chik How, MU, Yi, SUSILO, Willy, WONG, Duncan S.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7347
https://ink.library.smu.edu.sg/context/sis_research/article/8350/viewcontent/1_s2.0_S0304397513006786_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English