Abstract
If the physical description of a person would be unique and adequately used and tested, then the security of the Fiat-Shamir scheme is not based on zero-knowledge. Otherwise some new frauds exist. The Feige-Fiat-Shamir scheme always suffers from these bauds. Using an extended notion of subliminal channels, several other undetectable abuses of the Fiat-Shamir protocol, which are not possible with ordinary passports, are discussed. This technique can be used by a terrorist sponsoring country to communicate 500 new words of secret information each time a tourist passport is verified. A non-trivial solution to avoid these subliminal channel problems is presented. The notion of relative zero-knowledge is introduced.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier. and J-J. Quisquater. Aspects and importance of secure implementations of identification systems. June 1987. Submitted to the Journal of Cryptology.
M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In Advances in Cryptology. Proc. of Crypto’84 (Lecture Notes in Computer Science 196), pages 289–299, Springer-Verlag, New York, 1985. Santa Barbara, August 1984.
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. Siam J. Comput., 13(4):850–864, November 1984.
D. Chaum. Untraceable electronic mail, return addresses. and digital pseudonyms. Commun. ACM, 24(2):84–88. February 1981.
Y. Desmedt. A subliminal-free authentication system and its use for identification. In preparation.
Y. Desmedt and C. Goutier. Abuses of zero-knowledge proofs. in particular the Fiat-Shamir identification protocol. In preparation.
Y. Desmedt, C. Goutier, and S. Bengio. Special use and abuses of the Fiat-Shamir passport protocol. February 28, 1987. Submitted version of the paper.
Y. Desmedt and J.-J. Quisquater. Public key systems based on the difficulty of tampering (Is there a difference between DES and RSA?). Presented at CRYPTO’86, Santa Barbara, California, U. S. A., August 11–15, 1986, extended abstract will appear in Advances in Cryptology, Proc. of Crypto’86, Lecture Notes in Computer Science, Springer-Verlag, 1987.
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6):644–654, November 1976.
U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. In Proceedings of the Nineteenth ACM Symp. Theory of Computing, STOC, pages 210–217, May 25–27, 1987.
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. August 3–11, 1986. Presented at the International Congress of Mathematicians, ICM 86, Berkeley, California, U.S.A.
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. August 11–15, 1986. Presented at Crypto’86, Santa Barbara, California.
J. Gleick. A new approach to protecting secrets is discovered. New York Times, pp. C1 and C3, February 18, 1987.
J.-J. Quisquater. Signatures, identifications et controles d’accès. December 16, 1986. Lecture given at INRIA (France).
J. Saltzer. On digital signatures. ACM Operating Syst. Rev., 12(2):12–14, April 1978.
A. Shamir. Interactive identification. March 23–29, 1986. Presented at the Workshop on Algorithms, Randomness and Complexity, Centre International de Rencontres Mathématiques (CIRM), Luminy (Marseille), France.
G. J. Simmons. The prisoners’ problem and the subliminal channel. In D. Chaum, editor, Advances an Cryptology. Proc. of Crypto 83, pages 51–67, Plenum Press N.Y., 1984. Santa Barbara, California, August 1983.
G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. Proc. of Crypto 85 (Lecture Notes in Computer Science 218), pages 33–41, Springer-Verlag, 1986. Santa Barbara, California, August 18–22, 1985.
G. J. Simmons. A system for verifying user identity and authorization at the point-of sale or access. Cryptologia, 8(1):1–21, January 1984.
D. Slater. A note on the relationship between covert channels and application verification. ACM, SIG Security Audit & Control Review, 5(1):22, 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y., Goutier, C., Bengio, S. (1988). Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract). In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_3
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive