Page Properties | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Quotes
Active Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to engage, acting as a server, in sequential executions of the identification scheme with P until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.
...