{ "name": "Identification schemes and entity authentication", "order": 26, "challenges": [ { "id": "59a5801209a6acac5983b691", "title": "Introduction to identification schemes and entity authentication", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b260", "title": "Challenge-and-response in the secret-key setting", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b261", "title": "Attack model and adversarial goals", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b262", "title": "Mutual authentication", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b263", "title": "Challenge-and-response in the public-key setting", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b264", "title": "Certificates", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b265", "title": "Public-key identification schemes", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b266", "title": "Schnorr identification scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b267", "title": "Security of the Schnorr identification scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b268", "title": "Okamoto identification scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b269", "title": "Guillou-Quisquater identification scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b270", "title": "Identity-based identification schemes", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }