Anonymous Credential Protocol Based on SM2 Digital Signature

被引:0
|
作者
Zhao Y.-Q. [1 ]
Yang X.-Y. [2 ]
Feng Q. [3 ]
Yu Y. [4 ]
机构
[1] School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an
[2] Department of Computing, The Hong Kong Polytechnic University, Hong Kong
[3] School of Cyber Science and Engineering, Wuhan University, Wuhan
[4] School of Computer Science, Shaanxi Normal University, Xi’an
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 07期
关键词
anonymous credentials protocol; SM2; zero-knowledge proof; ZKB++;
D O I
10.13328/j.cnki.jos.006929
中图分类号
学科分类号
摘要
As a privacy-preserving digital identity authentication technology, anonymous credentials not only authenticate the validity of the users’ digital identity but also protect the privacy of their identity. Anonymous credentials are widely applied in anonymous authentication, anonymous tokens, and decentralized digital identity systems. Existing anonymous credentials usually adopt the commitment-signature-proof paradigm, which requires that the adopted signature scheme should have the re-randomization property, such as CL signatures, PS signatures, and structure-preserving signatures (SPS). In practical applications, ECDSA, Schnorr, and SM2 are widely employed for digital identity authentication, but they lack the protection of user identity privacy. Therefore, it is of certain practical significance to construct anonymous credentials compatible with ECDSA, Schnorr, SM2, and other digital signatures, and protect identity privacy during the authentication. This study explores anonymous credentials based on SM2 digital signature. Pedersen commitment is utilized to commit the user attributes in the registration phase. Meanwhile, according to the structural characteristics of SM2, the signed message is H(m), and the equivalence between the Pedersen commitment message and the hash commitment message is proven. This study also employs ZKB++ technology to prove the equivalence of algebraic and non-algebraic statements. The commitment message is transformed to achieve the cross-domain proof and issue the users’ credentials based on the SM2 digital signature. In the showing phase of anonymous credentials, the zero-knowledge proof is combined to prove the possession of an SM2 signature and ensure the anonymity of credentials. This study provides the construction of an anonymous credential protocol based on SM2 digital signature and proves the security of this protocol. Finally, it also verifies the effectiveness and feasibility of the protocol by analyzing the computational complexity of the protocol and testing the algorithm execution efficiency. © 2024 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3469 / 3481
页数:12
相关论文
共 36 条
  • [1] (2020)
  • [2] Lindell Y., Fast secure two-party ECDSA signing, Journal of Cryptology, 34, 4, (2021)
  • [3] Schnorr CP., Efficient identification and signatures for smart cards, Proc. of the 1989 Workshop on the Theory and Application of Cryptographic Techniques, pp. 688-689, (1989)
  • [4] Wang ZH, Zhang ZF., Overview on public key cryptographic algorithm SM2 based on elliptic curves, Journal of Information Security Research, 2, 11, pp. 972-982, (2016)
  • [5] Kurbatov O, Kravchenko P, Poluyanenko N, Demenko Y, Kuznetsova T., Global digital identity and public key infrastructure, Proc. of the 16th Int’l Conf. on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. ICTERI Workshops 2020, pp. 1-12, (2020)
  • [6] Information on German Identity Card. eID, (2022)
  • [7] Chaum D., Security without Identification: Transaction systems to make big brother obsolete, Communications of the ACM, 28, 10, pp. 1030-1044, (1985)
  • [8] Camenisch J, Lysyanskaya A., An efficient system for non-transferable anonymous credentials with optional anonymity revocation, Proc. of the 2001 Int’l Conf. on the Theory and Application of Cryptographic Techniques, pp. 93-118, (2001)
  • [9] Camenisch J, Lysyanskaya A., Signature schemes and anonymous credentials from bilinear maps, Proc. of the 24th Annual Int’l Cryptology Conf. on Advances in Cryptology, pp. 56-72, (2004)
  • [10] Muth R, Galal T, Heiss J, Tschorsch F., Towards smart contract-based verification of anonymous credentials, IACR Cryptology ePrint Archive, (2022)