Abstract
Several algorithmic methods are presented for preventing the middleperson attack in identification schemes based on the zero-knowledge technique.