A note on the cramer-damgård identification scheme

Yunlei Zhao,Shirley H. C. Cheung,Binyu Zang,Bin Zhu
DOI: https://doi.org/10.1007/11600930_38
2005-01-01
Abstract:In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zero-knowledge (ZK) protocols when the verifier has his public-key, we re-investigate the Cramer-Damgård intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack. Our attacks are independent of the underlying hardness assumptions assumed.
What problem does this paper attempt to address?