On Concurrent Identification Protocols
| dc.contributor.author | Goldreich, Oded | en_US |
| dc.date.accessioned | 2023-03-29T14:23:51Z | |
| dc.date.available | 2023-03-29T14:23:51Z | |
| dc.date.issued | 1983-12 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/149060 | |
| dc.description.abstract | We consider communication networks in which it is not possible to identify the source of a message which is broadcastes through the network. A natural question is whether it is possible for two users to identify each other concurrently, through a secure two-party protocol. We show that more than the existence of a secure Public Key Cryptosystem should be assumed in order to present a secure protocol for concurrent identification. We present two concurrent identification protocols: The first one relies on the existence of a center who has distributed "identification tags" two the users; while the second protocol relies on the distribution of "experimental sequences" by instances of a pre-protocol which have taken place between every two users. | en_US |
| dc.relation.ispartofseries | MIT-LCS-TM-250 | |
| dc.title | On Concurrent Identification Protocols | en_US |
