@inproceedings{zhao2005a, author = {Zhao, Yunlei and Cheung, Shirley H. C. and Zang, Binyu and Zhu, Bin Benjamin}, title = {A Note on the Cramer-Damgard Identification Scheme}, booktitle = {Workshop on Internet and Network Economics}, year = {2005}, month = {January}, abstract = {In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zero-knowledge (ZK) protocols when the verifier has his public-key, we re-investigate the Cramer-Damgård intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack. Our attacks are independent of the underlying hardness assumptions assumed.}, url = {http://approjects.co.za/?big=en-us/research/publication/a-note-on-the-cramer-damgard-identification-scheme/}, edition = {Workshop on Internet and Network Economics}, }