This chapter considers techniques designed to allow one party (the verifier) to gain assurances that the identity of another (the claimant) is as declared, thereby preventing impersonation. 388Ĭhallenge-response identification (strong authentication)Ĭustomized and zero-knowledge identification protocolsĪttacks on identification protocols.