19.2 The Feige-Fiat-Shamir Identification Scheme
The preceding protocol requires several communications between Peggy and Victor. The Feige-Fiat-Shamir method reduces this number and uses a type of parallel verification. This then is used as the basis of an identification scheme.
Again, let be the product of two large primes. Peggy has secret numbers . Let (we assume ). The numbers are sent to Victor. Victor will try to verify that Peggy knows the numbers . Peggy and Victor proceed as follows:
Peggy chooses a random integer , computes and sends to Victor.
Victor chooses numbers with each . He sends these to Peggy.
Peggy computes
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.