On the Efficiency of Revocation in RSA-Based Anonymous Systems

被引:13
|
作者
Fueyo, Maria [1 ]
Herranz, Javier [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat, ES-08034 Barcelona, Spain
关键词
Anonymous authentication; RSA; revocation; non-membership arguments; ACCUMULATORS; SCHEME;
D O I
10.1109/TIFS.2016.2559443
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users, and then requiring users to additionally prove, when authenticating themselves, that they are in L-W (membership proof) or that they are not in L-B (non-membership proof). Of course, these additional proofs must not break the anonymity properties of the system, so they must be zero-knowledge proofs, revealing nothing about the identity of the users. In this paper, we focus on the RSA-based setting, and we consider the case of non-membership proofs to blacklists L = L-B. The existing solutions for this setting rely on the use of universal dynamic accumulators; the underlying zero-knowledge proofs are bit complicated, and thus their efficiency; although being independent from the size of the blacklist L, seems to be improvable. Peng and Bao already tried to propose simpler and more efficient zero-knowledge proofs for this setting, but we prove in this paper that their protocol is not secure. We fix the problem by designing a new protocol, and formally proving its security properties. We then compare the efficiency of the new zero-knowledge non-membership protocol with that of the protocol, when they are integrated with anonymous authentication systems based on RSA (notably, the IBM product Idemix for anonymous credentials). We discuss for which values of the size k of the blacklist L, one protocol is preferable to the other one, and we propose different ways to combine and implement the two protocols.
引用
收藏
页码:1782 / 1790
页数:9
相关论文
共 50 条
  • [41] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [42] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [43] New RSA-Based Public Key Encryption with Authorized Equality Test
    Park, ChanHyeok
    Choi, Seongbong
    Son, Yongseok
    Paek, Jeongyeup
    Cho, Sungrae
    Lee, Hyung Tae
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 299 - 304
  • [44] A randomized RSA-based partially blind signature scheme for electronic cash
    Cao, TJ
    Lin, DD
    Xue, R
    COMPUTERS & SECURITY, 2005, 24 (01) : 44 - 49
  • [45] Dynamic reblocking RSA-based multisignatures scheme for computer and communication networks
    Pon, SF
    Lu, EH
    Lee, JY
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (01) : 43 - 44
  • [46] Quantitative Model Checking of an RSA-based Email Protocol on Mobile Devices
    Petridou, Sophia
    Basagiannis, Stylianos
    Alexiou, Nikolaos
    Papadimitriou, Georgios
    Katsaros, Panagiotis
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [47] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646
  • [48] Practical Anonymous Subscription with Revocation Based on Broadcast Encryption
    Yi, Xun
    Paulet, Russell
    Bertino, Elisa
    Rao, Fang-Yu
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 241 - 252
  • [49] A RSA-Based Data Integrity Check without Original Data in the Cloud Computing
    Zhang, Jianhong
    Liu, Xue
    Lu, Chenglian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3726 - +
  • [50] On the design of efficient RSA-based off-line electronic cash schemes
    Varadharajan, V
    Nguyen, KQ
    Mu, Y
    THEORETICAL COMPUTER SCIENCE, 1999, 226 (1-2) : 173 - 184