Round-Optimal Deniable Ring Authentication in the Presence of Big Brother

被引:0
|
作者
Dowsley, Rafael [1 ]
Hanaoka, Goichiro [2 ]
Imai, Hideki [2 ]
Nascimento, Anderson C. A. [1 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Campus Univ Darcy Ribeiro, BR-70910900 Brasilia, DF, Brazil
[2] Natl Inst Adv Ind Sci & Technol, Chyioda-ku, Chyioda, Tokyo 101-0021, Japan
来源
关键词
Deniable Ring Authentication; Broadcast Encryption; Big Brother; COMPUTATIONAL DIFFIE-HELLMAN; PUBLIC-KEY ENCRYPTION; ZERO-KNOWLEDGE PROOF; BROADCAST ENCRYPTION; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we propose a Deniable Ring Authentication scheme secure against a powerful Big Brother type of adversary and yielding an optimal number of communication rounds. Our scheme is based on an infra-structure assumption: the existence of verifiable Broadcast Encryption. Particularly, our solution can be instantiated by using the Broadcast Encryption protocol of Boneh, Gentry and Waters (CRYPTO 2005), resulting in a Deniable Ring Authentication protocol with constant message size.
引用
收藏
页码:307 / +
页数:3
相关论文
共 50 条
  • [21] Round-Optimal Secure Multiparty Computation with Honest Majority
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 395 - 424
  • [22] Efficient Round-Optimal Blind Signatures in the Standard Model
    Ghadafi, Essam
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 455 - 473
  • [23] Round-Optimal Secure Multi-party Computation
    Halevi, Shai
    Hazay, Carmit
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
  • [24] Round-optimal secure two-party computation
    Katz, J
    Ostrovsky, R
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
  • [25] Concurrently deniable ring authentication and its application to LBS in VANETs
    Zeng, Shengke
    Chen, Yong
    Tan, Shuangquan
    He, Mingxing
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 844 - 856
  • [26] Concurrently deniable ring authentication and its application to LBS in VANETs
    Shengke Zeng
    Yong Chen
    Shuangquan Tan
    Mingxing He
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 844 - 856
  • [27] Round-Optimal Multi-party Computation with Identifiable Abort
    Ciampi, Michele
    Ravi, Divya
    Siniscalchi, Luisa
    Waldner, Hendrik
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 335 - 364
  • [28] Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
    Badrinarayanan, Saikrishna
    Masny, Daniel
    Mukherjee, Pratyay
    Patranabis, Sikhar
    Raghuraman, Srinivasan
    Sarkar, Pratik
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 376 - 405
  • [29] Round-Optimal Password-Based Authenticated Key Exchange
    Katz, Jonathan
    Vaikuntanathan, Vinod
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (04) : 714 - 743
  • [30] Round-optimal zero-knowledge proofs of knowledge for NP
    Li HongDa
    Feng DengGuo
    Li Bao
    Xue HaiXia
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2473 - 2484