19.2 The Feige-Fiat-Shamir Identification Scheme

The preceding protocol requires several communications between Peggy and Victor. The Feige-Fiat-Shamir method reduces this number and uses a type of parallel verification. This then is used as the basis of an identification scheme.

Again, let n=pq be the product of two large primes. Peggy has secret numbers s1, , sk. Let visi2  (modn) (we assume gcd(si, n)=1). The numbers vi are sent to Victor. Victor will try to verify that Peggy knows the numbers s1, , sk. Peggy and Victor proceed as follows:

  1. Peggy chooses a random integer r, computes xr2  (modn) and sends x to Victor.

  2. Victor chooses numbers b1, , bk with each bi{0, 1}. He sends these to Peggy.

  3. Peggy computes yrs1b1s2b2skbk  (mo

Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.