摘要 |
FIELD: information technology.SUBSTANCE: authentication device, which includes a key storage module for storing L(L?2) secret keys s(i = 1 to L) and L public keys y, which satisfy the condition y=F(s) with respect to a set F of polynomials of multiple variables of the n-th order (n?2), and a module for executing an interactive protocol, designed for performing, using a verification interactive protocol, verification of the value of (L-1) secret keys s, which satisfy the condition y=F(s). The module for executing the interactive protocol includes a call receiving module for receiving L calls Chfrom the verifier; a call selection module for arbitrary selection of (L-1) calls Chfrom L calls Ch, received by the call receiving module; a response generating module for generating, using the secret keys s, (L-1) responses Rsp, respectively, for L-1) calls Chselected by the call selection module, and a response transmitting module for transmitting to the verifier (L-1) responses Rspgenerated by the response generating module.EFFECT: effective protection of a digital signature.8 cl, 21 dwg |