No-leak authentication by the Sherlock Holmes method
نویسندگان
چکیده
We propose a class of authentication schemes that are literally zeroknowledge, as compared to what is formally defined as “zero-knowledge” in cryptographic literature. We call this “no-leak” authentication to distinguish from an established “zero-knowledge” concept. The “no-leak” condition implies “zero-knowledge” (even “perfect zero-knowledge”), but it is actually stronger, as we illustrate by examples. The principal idea behind our schemes is: the verifier challenges the prover with questions that he (the verifier) already knows answers to; therefore, even a computationally unbounded verifier who follows the protocol cannot possibly learn anything new during any number of authentication sessions. This is therefore also true for a computationally unbounded passive adversary.
منابع مشابه
Sherlock Holmes on Reasoning
1. How I rediscovered Sherlock Holmes It was in the fall of 1987. This year, people all over the world celebrated the Centenary of Sherlock Holmes. Of course I knew who Sherlock Holmes was, since I had read several stories of Holmes during my high school days, and watched some TV programs on Holmes, afterward. But, actually, I did not know Holmes really well, because my memories were rather vag...
متن کاملLewis on Meinongian Logic
In “Truth in Fiction,” David Lewis raises four objections to a Meinongian semantics of fiction. Lewis does not deny that a Meinongian logic of fiction could be made to work, but identifies disadvantages in Meinongian semantics as a reason for recommending his own possible worlds alternative. A Meinongian semantics proposes to explain meaning without ontological prejudice. It analyzes the meanin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010