亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 21-03.html

?? 應用密碼學電子書籍
?? HTML
字號:
<html><head><TITLE>APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Identification Schemes</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Applied Cryptography, Second Edition: Protocols,  Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=21//-->
<!--PAGES=507-509//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="21-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="21-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>The setup is the same as the identification scheme. Choose <I>n</I> to be the product of two large primes. Generate the public key, <I>v</I><SUB>1,</SUB> <I>v</I><SUB>2,...,</SUB> <I>v</I><SUB>k</SUB>, and the private key, <I>s</I><SUB>1,</SUB> <I>s</I><SUB>2,...,</SUB> <I>s</I><SUB>k</SUB>, such that <I>s</I><SUB>i</SUB> = sqrt (<I>v</I>i<SUP>-1</SUP>) mod <I>n.</I></P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Alice picks <I>t</I> random integers between 1 and <I>n: r</I><SUB>1,</SUB> <I>r</I><SUB>2,...,</SUB> <I>r</I><SUB>t</SUB>, and computes <I>x</I><SUB>1,</SUB> <I>x</I><SUB>2,...,</SUB> <I>x</I><SUB>t</SUB> such that <I>x</I><SUB>i</SUB> = <I>r</I><SUB>i</SUB><SUP>2</SUP> mod <I>n.</I>
<DD><B>(2)</B>&nbsp;&nbsp;Alice hashes the concatenation of the message and the string of <I>x</I>is to generate a bit stream: <I>H</I>(<I>m, x</I><SUB>1,</SUB> <I>x</I><SUB>2,...,</SUB> <I>x</I><SUB>t</SUB>). She uses the first <I>k</I> * <I>t</I> bits of this string as values of <I>b</I><SUB>ij</SUB>, where <I>i</I> goes from 1 to <I>t,</I> and <I>j</I> goes from 1 to <I>k.</I>
<DD><B>(3)</B>&nbsp;&nbsp;Alice computes <I>y</I><SUB>1,</SUB> <I>y</I><SUB>2,...,</SUB> <I>y</I><SUB>t</SUB>, where
<BR><I>y</I><SUB>i</SUB> = <I>r</I><SUB>i</SUB> * (<I>s</I><SUB>1</SUB><SUP>b</SUP><SMALL><SUP>i<I>1</I></SUP></SMALL> * <I>s</I><SUB>2</SUB><SUP>b</SUP><SMALL><SUP>i<I>2</I></SUP></SMALL> *...* <I>s</I><SUB>k</SUB><SUP>b</SUP><SMALL><SUP>i<I>k</I></SUP></SMALL>) mod <I>n</I>
<BR>(For each <I>i,</I> she multiplies together the values of the <I>s</I><SUB>j</SUB> based on the random <I>b</I><SUB>i,j</SUB> values. If <I>b</I><SUB>i,1</SUB> is a 1, then <I>s</I><SUB>1</SUB> is multiplied; if <I>b</I><SUB>i,1</SUB> is a 0, then <I>s</I><SUB>1</SUB> is not multiplied.)
<DD><B>(4)</B>&nbsp;&nbsp;Alice sends Bob <I>m,</I> all the bit values of <I>b</I><SUB>i,j,</SUB> and all the values of <I>y</I><SUB>i</SUB>. He already has Alice&#146;s public key: <I>v</I><SUB>1,</SUB> <I>v</I><SUB>2,...,</SUB> <I>v</I><SUB>k</SUB>.
<DD><B>(5)</B>&nbsp;&nbsp;Bob computes <I>z</I><SUB>1,</SUB> <I>z</I><SUB>2,...,</SUB> <I>z</I><SUB>t</SUB>, where
<BR><I>z</I><SUB>i</SUB> = <I>y</I><SUB>i</SUB><SUP>2</SUP> * (<I>v</I><SUB>1</SUB><SUP>b</SUP><SMALL><SUP>i<I>1</I></SUP></SMALL> * <I>v</I><SUB>2</SUB><SUP>b</SUP><SMALL><SUP>i<I>2</I></SUP></SMALL> *...* <I>v</I><SUB>k</SUB><SUP>b</SUP><SMALL><SUP>i<I>k</I></SUP></SMALL>) mod <I>n</I>
<BR>(Again, Bob multiplies based on the <I>b</I><SUB>i, j</SUB> values.) Also note that <I>z</I><SUB>i</SUB> should be equal to <I>x</I><SUB>i</SUB>.
<DD><B>(6)</B>&nbsp;&nbsp;Bob verifies that the first <I>k</I> * <I>t</I> bits of <I>H</I>(<I>m, z</I><SUB>1,</SUB> <I>z</I><SUB>2,...,</SUB> <I>z</I><SUB>t</SUB>) are the <I>b</I><SUB>i, j</SUB> values that Alice sent him.
</DL>
<P>As with the identification scheme, the security of this signature scheme is proportional to 1/2<SUP>kt</SUP>. It also depends on the difficulty of factoring <I>n.</I> Fiat and Shamir pointed out that forging a signature is easier when the complexity of factoring <I>n</I> is considerably lower than 2<SUP>kt</SUP>. And, because of birthday-type attacks (see Section 18.1), they recommend that <I>k</I> * <I>t</I> be increased from 20 to at least 72. They suggest <I>k</I> = 9 and <I>t</I> = 8.</P>
<P><FONT SIZE="+1"><B><I>Improved Fiat-Shamir Signature Scheme</I></B></FONT></P>
<P>Silvio Micali and Adi Shamir improved the Fiat-Shamir protocol in [1088]. They chose <I>v</I><SUB>1,</SUB> <I>v</I><SUB>2,...,</SUB> <I>v</I><SUB>k</SUB> to be the first <I>k</I> prime numbers. So</P>
<DL>
<DD><I>v</I><SUB>1</SUB> = 2, <I>v</I><SUB>2</SUB> = 3, <I>v</I><SUB>3</SUB> = 5, and so on.
</DL>
<P>This is the public key.
</P>
<P>The private key, <I>s</I><SUB>1,</SUB> <I>s</I><SUB>2,...,</SUB> <I>s</I><SUB>k</SUB> is a random square root, determined by</P>
<DL>
<DD><I>s</I><SUB>i</SUB> = sqrt (<I>v</I><SUB>i</SUB><SUP>-1</SUP>) mod <I>n</I>
</DL>
<P>In this version, every person must have a different <I>n.</I> The modification makes it easier to verify signatures. The time required to generate signatures, and the security of those signatures, is unaffected.</P>
<P><FONT SIZE="+1"><B><I>Other Enhancements</I></B></FONT></P>
<P>There is also an <I>N-</I>party identification scheme, based on the Fiat-Shamir algorithm [264]. Two other improvements to the Fiat-Shamir scheme are proposed in [1218]. Another variant is [1368].</P>
<P><FONT SIZE="+1"><B><I>Ohta-Okamoto Identification Scheme</I></B></FONT></P>
<P>This protocol is a modification of the Feige-Fiat-Shamir identification scheme and gets its security from the difficulty of factoring [1198,1199]. The same authors also wrote a multisignature scheme (see Section 23.1), by which a number of different people can sequentially sign a message [1200]. This scheme has been proposed for smart-card implementation [850].
</P>
<P><FONT SIZE="+1"><B><I>Patents</I></B></FONT></P>
<P>Fiat-Shamir is patented [1427]. Anyone interested in licensing the algorithm should contact Yeda Research and Development, The Weizmann Institute of Science, Rehovot 76100, Israel.
</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">21.2 Guillou-Quisquater</FONT></H3>
<P>Feige-Fiat-Shamir was the first practical identity-based protocol. It minimized computation by increasing the number of iterations and accreditations per iteration. For some implementations, like smart cards, this is less than ideal. Exchanges with the outside world are time-consuming, and the storage required for each accreditation can strain the limited resources of the card.
</P>
<P>Louis Guillou and Jean-Jacques Quisquater developed a zero-knowledge identification algorithm more suited to applications like these [670,1280]. The exchanges between Peggy and Victor and the parallel accreditations in each exchange are both kept to an absolute minimum: There is only one exchange of one accreditation for each proof. For the same level of security, the computation required by Guillou-Quisquater is greater than by Feige-Fiat-Shamir by a factor of three. And like Feige-Fiat-Shamir, this identification algorithm can be converted to a digital signature algorithm.</P>
<P><FONT SIZE="+1"><B><I>Guillou-Quisquater Identification Scheme</I></B></FONT></P>
<P>Peggy is a smart card who wants to prove her identity to Victor. Peggy&#146;s identity consists of a set of credentials: a data string consisting of the card&#146;s name, validity period, a bank account number, and whatever else the application warrants. This bit string is called <I>J.</I> (Actually, the credentials can be a longer string and hashed to a <I>J</I> value. This complexity does not modify the protocol in any way.) This is analogous to the public key. Other public information, shared by all &#147;Peggys&#148; who could use this application, is an exponent <I>v</I> and a modulus <I>n,</I> where <I>n</I> is the product of two secret primes. The private key is <I>B,</I> calculated such that <I>JB</I><SUP>v</SUP> &#8801; 1 (mod <I>n</I>).</P>
<P>Peggy sends Victor her credentials, <I>J.</I> Now, she wants to prove to Victor that those credentials are hers. To do this, she has to convince Victor that she knows <I>B.</I> Here&#146;s the protocol:</P>
<DL>
<DD><B>(1)</B>&nbsp;&nbsp;Peggy picks a random integer <I>r,</I> such that <I>r</I> is between 1 and <I>n</I> - 1. She computes <I>T</I> = <I>r</I><SUP>v</SUP> mod <I>n</I> and sends it to Victor.
<DD><B>(2)</B>&nbsp;&nbsp;Victor picks a random integer, <I>d,</I> such that <I>d</I> is between zero and <I>v</I> - 1. He sends <I>d</I> to Peggy.
<DD><B>(3)</B>&nbsp;&nbsp;Peggy computes <I>D</I> = <I>rB</I><SUP>d</SUP> mod <I>n,</I> and sends it to Victor.
<DD><B>(4)</B>&nbsp;&nbsp;Victor computes <I>T</I><SUP>&#180;</SUP> = <I>D</I><SUP>v</SUP><I>J</I><SUP>d</SUP> mod <I>n.</I> If <I>T</I> &#8801; <I>T</I><SUP>&#180;</SUP> (mod <I>n</I>), then the authentication succeeds.
</DL>
<P>The math isn&#146;t that complex:
</P>
<DL>
<DD><I>T</I><SUP>&#180;</SUP> = <I>D</I><SUP>v</SUP><I>J</I><SUP>d</SUP> = (<I>rB</I><SUP>d</SUP>)<SUP>v</SUP><I>J</I><SUP>d</SUP> = <I>r</I><SUP>v</SUP>B<SUP>dv</SUP><I>J</I><SUP>d</SUP> = <I>r</I><SUP>v</SUP>(<I>JB</I><SUP>v</SUP>)<SUP>d</SUP> = <I>r</I><SUP>v</SUP> &#8801; <I>T</I> (mod <I>n</I>)
</DL>
<P>since <I>B</I> was constructed to satisfy</P>
<DL>
<DD><I>JB</I><SUP>v</SUP> &#8801; 1 (mod <I>n</I>)
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="21-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="21-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>

[an error occurred while processing this directive]
</body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一本到不卡免费一区二区| 91在线视频播放| 亚洲欧美怡红院| 国产日韩欧美精品在线| 国产精品久久久久久久久快鸭| 亚洲色图在线视频| 国v精品久久久网| 久久伊人中文字幕| 精品一区二区影视| 精品国产亚洲在线| 成人午夜私人影院| 亚洲欧洲精品成人久久奇米网| www.av亚洲| 精品一区二区免费看| 亚洲小说欧美激情另类| 亚洲国产精品二十页| 日韩欧美国产一区二区三区 | 亚洲老司机在线| 久久精品在这里| 日韩一级二级三级| 精品1区2区3区| 91色porny| 成人激情综合网站| 国产成人免费网站| 黄页网站大全一区二区| 日韩高清在线不卡| 亚洲不卡在线观看| 亚洲综合在线电影| 亚洲激情男女视频| 中文字幕在线一区免费| 国产人成一区二区三区影院| 精品欧美黑人一区二区三区| 日韩午夜在线观看| 91精品久久久久久久99蜜桃| 欧美精品一卡两卡| 91.com视频| 欧美一级在线观看| 777a∨成人精品桃花网| 欧美精品电影在线播放| 在线播放一区二区三区| 777久久久精品| 日韩欧美黄色影院| 久久中文娱乐网| 久久久精品影视| 国产亚洲成av人在线观看导航| 亚洲精品在线免费观看视频| 国产亚洲精品超碰| 欧美国产日本韩| 亚洲欧洲一区二区在线播放| 亚洲精品视频在线观看免费| 亚洲小说春色综合另类电影| 日韩av中文字幕一区二区三区 | 亚洲电影一区二区三区| 午夜视频在线观看一区二区| 日韩—二三区免费观看av| 麻豆国产精品视频| 国产成人综合在线| 99国产麻豆精品| 欧美亚洲综合在线| 欧美一级二级在线观看| 精品国产精品网麻豆系列| 国产欧美一区二区在线| 国产精品短视频| 亚洲狠狠爱一区二区三区| 日本91福利区| 91福利在线观看| 欧美午夜精品一区二区三区| 欧美一区二区三区在线观看视频| 久久综合色天天久久综合图片| 国产精品三级av| 亚洲二区在线视频| 国产一区 二区| 91蜜桃网址入口| 91精品国产一区二区三区香蕉| 久久一日本道色综合| 亚洲男同性视频| 日本va欧美va精品| av中文字幕不卡| 欧美日韩国产综合草草| 久久精品网站免费观看| 伊人色综合久久天天| 久久精品999| 92国产精品观看| 日韩一本二本av| 中文字幕一区在线观看| 日本强好片久久久久久aaa| 国产精品羞羞答答xxdd| 欧亚洲嫩模精品一区三区| 欧美大肚乱孕交hd孕妇| 亚洲欧洲av一区二区三区久久| 视频一区欧美精品| eeuss影院一区二区三区| 在线不卡一区二区| 亚洲欧洲美洲综合色网| 麻豆精品视频在线观看视频| 91麻豆精品秘密| 亚洲精品在线观看视频| 亚洲国产日韩一区二区| 懂色中文一区二区在线播放| 最新国产成人在线观看| 亚洲成人综合网站| 国产麻豆日韩欧美久久| 色婷婷狠狠综合| 久久久一区二区三区| 亚洲妇女屁股眼交7| 97久久超碰精品国产| 国产欧美一区二区三区鸳鸯浴 | 国产91精品久久久久久久网曝门| 欧美图片一区二区三区| 国产精品美女久久久久aⅴ| 久久精品国产亚洲a| 欧美日韩久久久久久| 中文字幕色av一区二区三区| 精品一区二区三区在线播放视频 | 亚洲午夜在线观看视频在线| 高潮精品一区videoshd| 日韩视频免费直播| 午夜视黄欧洲亚洲| 久久九九99视频| 久久99精品视频| 欧美一级精品大片| 亚洲国产欧美一区二区三区丁香婷 | 亚洲高清免费在线| 一本到一区二区三区| 中文字幕一区二| 成人激情小说网站| 国产欧美日韩不卡| 国产一区二区三区日韩| 欧美xxxxx牲另类人与| 青青草国产成人99久久| 欧美久久久久久久久| 日韩黄色小视频| 日韩一区二区三区在线| 蜜桃视频第一区免费观看| 欧美精品777| 秋霞成人午夜伦在线观看| 欧美人动与zoxxxx乱| 亚洲福利国产精品| 91精品国产91久久久久久一区二区 | 欧美一级二级在线观看| 亚洲一级二级三级在线免费观看| 亚洲午夜电影在线| 欧美色涩在线第一页| 亚洲 欧美综合在线网络| 欧美日韩一本到| 性感美女久久精品| 91麻豆精品国产91久久久久久 | 欧美精品色一区二区三区| 亚洲国产欧美在线人成| 欧美区一区二区三区| 奇米色777欧美一区二区| 日韩一区二区电影网| 久久se精品一区二区| 久久一区二区三区国产精品| 国产成人无遮挡在线视频| 国产精品日韩成人| 在线免费观看不卡av| 天堂va蜜桃一区二区三区| 日韩视频永久免费| 国产成人在线视频网站| 中文字幕一区二区三区不卡 | 国产裸体歌舞团一区二区| 国产欧美一区二区三区沐欲| 99国产精品一区| 日韩高清欧美激情| 国产午夜亚洲精品不卡| 91亚洲精华国产精华精华液| 亚洲在线视频免费观看| 91精品婷婷国产综合久久性色| 国产综合久久久久影院| 国产精品成人免费在线| 欧美军同video69gay| 国产成人综合亚洲91猫咪| 悠悠色在线精品| 日韩精品一区二区三区老鸭窝| 国产成人精品免费在线| 亚洲激情网站免费观看| 精品国产a毛片| 色综合欧美在线视频区| 免费高清在线一区| 一色屋精品亚洲香蕉网站| 91精品国产综合久久久久久| 成人h动漫精品一区二区| 日日夜夜精品视频免费| 国产精品久久久久影院色老大| 欧美午夜电影网| 成人影视亚洲图片在线| 午夜亚洲福利老司机| 中文字幕一区在线观看| 日韩欧美一区在线观看| 色婷婷精品大在线视频| 国产一区二区成人久久免费影院| 亚洲欧美偷拍另类a∨色屁股| 精品欧美一区二区三区精品久久| 色婷婷亚洲一区二区三区| 91啦中文在线观看| 久久久久国产精品人| 在线观看国产91| 国产精品123| 人人狠狠综合久久亚洲|