ABSTRACT

The topic of this chapter is identification, which is also known as entity authentication. Roughly speaking, the goal of an identification scheme is is to allow someone’s identity to be confirmed. Normally this is done in “real time.” In contrast, cryptographic tools such as signature schemes allow the authentication of data, which can be performed any time after the relevant message has been signed.