An efficient and secure two-flow zero-knowledge identification protocol

被引:8
|
作者
Stinson, D. R. [1 ]
Wu, J. [1 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Identification; entity authentication; zero-knowledge;
D O I
10.1515/JMC.2007.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a new zero-knowledge identification protocol. While the protocol consists of only two message flows, it does not rely on any underlying signature or encryption scheme. Its zero-knowledge property is preserved under concurrent composition and reset settings. It is secure under the strongest attack model which incorporates concurrent attacks, active-intruder attacks and reset attacks. Meanwhile its performance in computation and communication is close to that of the most efficient identification protocols not based on signature or encryption systems, most of which are insecure in this strong attack model.
引用
收藏
页码:201 / 220
页数:20
相关论文
共 50 条
  • [31] Languages with Efficient Zero-Knowledge PCPs are in SZK
    Mahmoody, Mohammad
    Xiao, David
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 297 - 314
  • [32] Efficient Zero-Knowledge Arguments For Paillier Cryptosystem
    Gong, Borui
    Lau, Wang Fat
    Au, Man Ho
    Yang, Rupeng
    Xue, Haiyang
    Li, Lichun
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 1813 - 1831
  • [33] Efficient Zero-Knowledge Argument for Correctness of a Shuffle
    Bayer, Stephanie
    Groth, Jens
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 263 - 280
  • [34] Security and Efficient Data Verification Protocol for Distributed Database based on Zero-knowledge Proof
    Liu, Han
    Bai, YunXu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 612 - 617
  • [35] Image Based Authentication Using Zero-Knowledge Protocol
    Mohamad, Zarina
    Thong, Lim Yan
    Zakaria, Aznida Hayati
    Awang, Wan Suryani Wan
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), 2018, : 202 - 210
  • [36] Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
    Lindell, Yehuda
    Zarosim, Hila
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 761 - 799
  • [37] Authenticated Session Key Distribution Protocol with Zero-Knowledge
    Xu, Chungen
    Yang, Yanjiong
    Dou, Bennian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3190 - +
  • [38] Adaptive Authentication Protocol Based on Zero-Knowledge Proof
    Chistousov, Nikita Konstantinovich
    Kalmykov, Igor Anatolyevich
    Dukhovnyj, Daniil Vyacheslavovich
    Kalmykov, Maksim Igorevich
    Olenev, Aleksandr Anatolyevich
    ALGORITHMS, 2022, 15 (02)
  • [39] Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
    Lindell, Yehuda
    Zarosim, Hila
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 183 - 201
  • [40] Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy
    Fu, Shihui
    Gong, Guang
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 180 - 204