On the Efficiency of Revocation in RSA-Based Anonymous Systems

被引:13
|
作者
Fueyo, Maria [1 ]
Herranz, Javier [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, ES-08034 Barcelona, Spain
关键词
Anonymous authentication; RSA; revocation; non-membership arguments; ACCUMULATORS; SCHEME;
D O I
10.1109/TIFS.2016.2559443
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users, and then requiring users to additionally prove, when authenticating themselves, that they are in L-W (membership proof) or that they are not in L-B (non-membership proof). Of course, these additional proofs must not break the anonymity properties of the system, so they must be zero-knowledge proofs, revealing nothing about the identity of the users. In this paper, we focus on the RSA-based setting, and we consider the case of non-membership proofs to blacklists L = L-B. The existing solutions for this setting rely on the use of universal dynamic accumulators; the underlying zero-knowledge proofs are bit complicated, and thus their efficiency; although being independent from the size of the blacklist L, seems to be improvable. Peng and Bao already tried to propose simpler and more efficient zero-knowledge proofs for this setting, but we prove in this paper that their protocol is not secure. We fix the problem by designing a new protocol, and formally proving its security properties. We then compare the efficiency of the new zero-knowledge non-membership protocol with that of the protocol, when they are integrated with anonymous authentication systems based on RSA (notably, the IBM product Idemix for anonymous credentials). We discuss for which values of the size k of the blacklist L, one protocol is preferable to the other one, and we propose different ways to combine and implement the two protocols.
引用
收藏
页码:1782 / 1790
页数:9
相关论文
共 50 条
  • [31] ANALYSIS OF HOMOMORPHIC PROPERTIES OF RSA-BASED CRYPTOSYSTEM FOR IMAGE SHARING
    Islam, Naveed
    Puech, William
    Hayat, Khizar
    Brouzet, Robert
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1825 - +
  • [32] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [33] Retrofitting fairness on the original RSA-based E-cash
    Xu, SH
    Yung, MT
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 51 - 68
  • [34] Weakness in a RSA-based password authenticated key exchange protocol
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Changhan
    Lim, Jongin
    INFORMATION PROCESSING LETTERS, 2008, 108 (06) : 339 - 342
  • [35] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [36] Comment on traceability on RSA-based partially signature with low computation
    Wu, LC
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1344 - 1348
  • [37] Multi-objective evolutionary hardware for RSA-based cryptosystems
    Nedjah, N
    Mourelle, LD
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 503 - 507
  • [38] A complete and explicit security reduction algorithm for RSA-based cryptosystems
    Kurosawa, K
    Schmidt-Samoa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 474 - 491
  • [39] New Methods and Abstractions for RSA-Based Forward Secure Signatures
    Hohenberger, Susan
    Waters, Brent
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 292 - 312
  • [40] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 63 - 75