SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL

被引:0
|
作者
Chunming TANG Zheng-an YAO School of Mathematics and Information Science
State Key Laboratory.of Information Security
机构
关键词
Σ-protocol; Blum integer; delegateable signature; secret sharing; witness hiding protocol; witness indistinguishable protocol; universal designated verifier signature;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
Σ-protocol has been proved to be a very powerful cryptographic tool and widely used innumerous important cryptographic applications.In this paper,the authors make use of Σ-protocol asa main tool to resolve the following difficult problems 1-3 and to construct three efficient cryptographicprotocols 4-6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ,whereP,Q are two different primes and both≡3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t-1 in a (t,n)-threshold secret sharing scheme;3) How to construct witness iudistinguishable and witness hiding protocol not from zero-knowledgeproof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.
引用
收藏
页码:260 / 279
页数:20
相关论文
共 50 条
  • [1] Several cryptographic applications of Σ-protocol
    Chunming Tang
    Zheng-an Yao
    Journal of Systems Science and Complexity, 2009, 22 : 260 - 279
  • [2] Several cryptographic applications of I£-protocol
    Tang, Chunming
    Yao, Zheng-an
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2009, 22 (02) : 260 - 279
  • [3] Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
    Delgado-Vargas, Kevin Andrae
    Gallegos-Garcia, Gina
    Escamilla-Ambrosio, Ponciano Jorge
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [4] Undeniable cryptographic protocol for both sender and receiver and its applications
    Li, X.X., 2001, Beijing University of Aeronautics and Astronautics (BUAA) (27):
  • [5] A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
    Haitner, Iftach
    Mahmoody, Mohammad
    Xiao, David
    25TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY - CCC 2010, 2010, : 76 - 87
  • [6] Fair non-repudiation cryptographic protocol and its formal analysis and applications
    Lin, X.X. (lixx@cscw.buaa.edu.cn), 1628, Chinese Academy of Sciences (11):
  • [7] Cryptographic protocol for payment transaction
    Cheng, CY
    Seman, K
    Yunus, J
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B1 - B5
  • [8] Cryptographic Protocol Analysis of AN.ON
    Westermann, Benedikt
    Wendolsky, Rolf
    Pimenidis, Lexi
    Kesdogan, Dogan
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 114 - +
  • [9] RF Simulator for Cryptographic Protocol
    Isa, Mohd Anuar Mat
    Hashim, Habibah
    Ab Manan, Jamalul-Lail
    Adnan, Syed Farid Syed
    Mahmod, Ramlan
    2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM COMPUTING AND ENGINEERING, 2014, : 518 - 523
  • [10] Multiparty quantum cryptographic protocol
    Ramzan, M.
    Khan, M. K.
    CHINESE PHYSICS LETTERS, 2008, 25 (10) : 3543 - 3546