Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Application of Quaternion Numbers in Identification Scheme


Affiliations
1 Qom University, Iran, Islamic Republic of
     

   Subscribe/Renew Journal


The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analysed.

Keywords

Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 234

PDF Views: 0




  • Application of Quaternion Numbers in Identification Scheme

Abstract Views: 234  |  PDF Views: 0

Authors

Reza Alimoradi
Qom University, Iran, Islamic Republic of

Abstract


The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analysed.

Keywords


Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation.