Abstract [eng] |
In this paper we discussed [Ste90] and [Ste94] identification schemes theoretical and practical aspects, such as: security aspect – main attack types, time needed to break any of discussed schemes (with the same parameter values). We compared the discussed identification schemes with other identification schemas based on other mathematical problems. In this paper we computed user identification time with practical parameters of all presented schemas, described possible improvements of our schemes, and examined proposed improvement of schemes. |