<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Massoud Hadian Dehkordi</style></author><author><style face="normal" font="default" size="100%">Reza Alimoradi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenge-Response Schemes Using Gap Diffie-Hellman Groups</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bilinear Pairing</style></keyword><keyword><style  face="normal" font="default" size="100%">challenge-response</style></keyword><keyword><style  face="normal" font="default" size="100%">Gap Diffie-Hellman Groups</style></keyword><keyword><style  face="normal" font="default" size="100%">Identification</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">98-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The increasing use of identification protocols in the recent years has made the secure identification one of the most important research issues in the advanced cryptography and the computer network security. Therefore, in this paper, using the basic designing of identification protocols, we introduce identification protocols in which the gap Diffie–Hellman group and the bilinear pairing have been used. In these schemes, some of the current challenge-response identification protocols have been improved in terms of efficiency and security.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">98</style></section></record></records></xml>