A Privacy-Preserving Zero-Knowledge Proof for Blockchain

被引:18
作者
Chi, Po-Wen [1 ]
Lu, Yun-Hsiu [1 ]
Guan, Albert [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept CSIE, Taipei 11677, Taiwan
关键词
Zero-knowledge proof; privacy protection; chameleon hash function; non-transferable; quantum-resistance; CHAMELEON HASH; AUTHENTICATION;
D O I
10.1109/ACCESS.2023.3302691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-Knowledge Proof (ZKP) is a useful tools for proving that a prover possesses a secret without revealing it to the verifier. Designated Verifier Proof (DVP) is a special type of ZKP that adds the ability to restrict the identity of verifiers so that only pre-determined authorized verifiers can verify. However, DVP and other similar schemes do not work if the verifier provides some additional information to indicate the provenance of the proof. Since this information may be stored on the blockchain, the proof can be accepted by third parties even if the verifier is willing to protect the privacy of the prover. In this paper, we propose the concept of Blockchain Designated Verifier Proof (BDVP), and design a BDVP scheme suitable for blockchain applications. The key technique behind our BDVP scheme is that the verifier can forge a fake secret to simulate the proof. Therefore, a third party cannot determine whether the prover possesses the secret. This enables the verifier to protect the privacy of the prover, which is required by law or regulation. We also address the quantum attack problem and propose a post-quantum solution. We evaluate and compare the performances of the proposed protocol with other related protocols.
引用
收藏
页码:85108 / 85117
页数:10
相关论文
共 43 条
[1]  
[Anonymous], 1988, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/0-387-34799-2_5
[2]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[3]  
Ateniese G., 2003, IACR CRYPTOL EPRINT
[4]   A Compressed Σ-Protocol Theory for Lattices [J].
Attema, Thomas ;
Cramer, Ronald ;
Kohl, Lisa .
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 :549-579
[5]   Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics [J].
Attema, Thomas ;
Cramer, Ronald .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :513-543
[6]  
Aumann Y, 1998, LECT NOTES COMPUT SC, V1462, P299, DOI 10.1007/BFb0055736
[7]   More Efficient Commitments from Structured Lattice Assumptions [J].
Baum, Carsten ;
Damgard, Ivan ;
Lyubashevsky, Vadim ;
Oechsner, Sabine ;
Peikert, Chris .
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 :368-385
[8]  
Campanelli M., 2021, 20211618 CRYPT EPRIN
[9]   Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge [J].
Chaidos, Pyrros ;
Couteau, Geoffroy .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 :193-221
[10]  
Chen X., 2009, Int. J. Netw. Secur, V1, P52