A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols

被引:0
作者
Almeida, Jose Bacelar [1 ]
Bangerter, Endre [2 ]
Barbosa, Manuel [1 ]
Krenn, Stephan [3 ]
Sadeghi, Ahmad-Reza [4 ]
Schneider, Thomas [4 ]
机构
[1] Univ Minho, P-4719 Braga, Portugal
[2] Bern Univ Appl Sci, Biel, Switzerland
[3] Bern Univ Appl Sci, Biel, Switzerland
[4] Ruhr Univ Bochum, Horst Gortz Inst IT-Security, Bochum, Germany
来源
COMPUTER SECURITY-ESORICS 2010 | 2010年 / 6345卷
关键词
Zero-Knowledge; Protocol Compiler; Formal Verification; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zero-knowledge proofs of knowledge (ZK-PoK) are important building blocks for numerous cryptographic applications. Although ZK-PoK have a high potential impact, their real world deployment is typically hindered by their significant complexity compared to other (non-interactive) crypto primitives. Moreover, their design and implementation are time-consuming and error-prone. We contribute to overcoming these challenges as follows: We present a comprehensive specification language and a compiler for ZK-PoK protocols based on Sigma-protocols. The compiler allows the fully automatic translation of an abstract description of a proof goal into an executable implementation. Moreover, the compiler overcomes various restrictions of previous approaches, e.g., it supports the important class of exponentiation homomorphisms with hidden-order co-domain, needed for privacy-preserving applications such as DAA. Finally, our compiler is certifying, in the sense that it automatically produces a formal proof of the soundness of the compiled protocol for a large class of protocols using the Isabelle/HOL theorem prover.
引用
收藏
页码:151 / +
页数:5
相关论文
共 57 条
[1]  
Almeida Jose Bacelar, 2010, 2010339 CRYPT EPRINT
[2]  
[Anonymous], 2019, LCP ISABELLE 2019
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
[Anonymous], 1997, Modular design of secure yet practical cryptographic protocols
[5]  
[Anonymous], 1998, THESIS ETH ZURICH
[6]  
[Anonymous], 2002, P 9 ACM C COMPUTER C
[7]  
[Anonymous], 1994, LECT NOTES COMPUTER, DOI DOI 10.1007/BFB0030556
[8]  
Backes M., 2008, IEEE COMP SEC FDN S, P255
[9]   Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol [J].
Backes, Michael ;
Maffei, Matteo ;
Unruh, Dominique .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :202-+
[10]  
Backes M, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P357