Application of Quaternion Numbers in Identification Scheme
Published: 2015
Author(s) Name: Reza Alimoradi |
Author(s) Affiliation: Faculty of Science, University of Qom, Qom, Iran
Locked
Subscribed
Available for All
Abstract
The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced
quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.
Keywords: Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation
View PDF