Abstract Views :214 |
PDF Views:0
Authors
Affiliations
1 Qom University, IR
Source
Journal of Network and Information Security, Vol 3, No 2 (2015), Pagination: 17-20
Abstract
The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analysed.
Keywords
Identification, Quaternion, Challenge-Response, Zero-Knowledge Proof, Defantiuos Equation.