Monday, 24 Feb, 2020




Application of Quaternion Numbers in Identification Scheme

Journal of Network and Information Security

Volume 3 Issue 2

Published: 2015
Author(s) Name: Reza Alimoradi | Author(s) Affiliation: Faculty of Science, University of Qom, Qom, Iran
Locked Subscribed Available for All


The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.

Keywords: Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback ©, All rights reserved