We will describe a new interactive identification scheme … [p. 78] Notice that we are using a trusted … [Key Authentication Center], to authenticate keys. However, its usage here is considerably different … the user is initially registered. … [p. 81] [The security of the Sandia scheme for interactive identification] is based on the difficulty of … [factoring and discrete logarithms]. Our goal was to provide an added measure of security … easy to solve. None of the other schemes …
Google-1
Google-2
Copyright clearance needed for quotation.