Thursday, 25 Apr, 2024

+91-9899775880

011-47044510

011-49075396

Application of Quaternion Numbers in Identification Scheme

Journal of Network and Information Security

Volume 3 Issue 2

Published: 2015
Author(s) Name: Reza Alimoradi | Author(s) Affiliation: Faculty of Science, University of Qom, Qom, Iran
Locked Subscribed Available for All

Abstract

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.

Keywords: Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved