Friday, 20 Sep, 2019

011-28082485

011-47044510

+91-9899775880

Application of Quaternion Numbers in Identification Scheme

Journal of Network and Information Security

Volume 3 Issue 2

Published: 2015
Author(s) Name: Reza Alimoradi | Author(s) Affiliation: Faculty of Science, University of Qom, Qom, Iran
Locked Subscribed Available for All

Abstract

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.

Keywords: Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved