Home No-leak authentication by the Sherlock Holmes method
Article
Licensed
Unlicensed Requires Authentication

No-leak authentication by the Sherlock Holmes method

  • Dima Grigoriev EMAIL logo and Vladimir Shpilrain
Published/Copyright: May 1, 2012
Become an author with De Gruyter Brill
Groups Complexity Cryptology
From the journal Volume 4 Issue 1

Abstract.

We propose a class of authentication schemes that are literally zero-knowledge, as compared to what is formally defined as “zero-knowledge” in cryptographic literature. We call this “no-leak” authentication to distinguish from an established “zero-knowledge” concept. The “no-leak” condition implies “zero-knowledge” (even “perfect zero-knowledge”), but it is actually stronger, as we illustrate by examples. The principal idea behind our schemes is: the verifier challenges the prover with questions that he (the verifier) already knows answers to; therefore, even a computationally unbounded verifier who follows the protocol cannot possibly learn anything new during any number of authentication sessions. This is therefore also true for a computationally unbounded passive adversary.

Received: 2012-02-07
Published Online: 2012-05-01
Published in Print: 2012-May

© 2012 by Walter de Gruyter Berlin Boston

Downloaded on 27.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/gcc-2012-0009/html
Scroll to top button