@inproceedings{3bfef6f97fd841a3add89694530b803a,
title = "How to prove yourself: Practical solutions to identification and signature problems",
abstract = "In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack if factoring is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control systems.",
author = "Amos Fiat and Adi Shamir",
note = "Publisher Copyright: {\textcopyright} 1987, Springer-Verlag Berlin Heidelberg.; null ; Conference date: 11-08-1986 Through 15-08-1986",
year = "1987",
doi = "10.1007/3-540-47721-7_12",
language = "אנגלית",
isbn = "9783540180470",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "186--194",
editor = "Odlyzko, {Andrew M.}",
booktitle = "Advances in Cryptology — CRYPTO 1986 - Proceedings",
}