A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols

被引:0
作者
Almeida, Jose Bacelar [1 ]
Bangerter, Endre [2 ]
Barbosa, Manuel [1 ]
Krenn, Stephan [3 ]
Sadeghi, Ahmad-Reza [4 ]
Schneider, Thomas [4 ]
机构
[1] Univ Minho, P-4719 Braga, Portugal
[2] Bern Univ Appl Sci, Biel, Switzerland
[3] Bern Univ Appl Sci, Biel, Switzerland
[4] Ruhr Univ Bochum, Horst Gortz Inst IT-Security, Bochum, Germany
来源
COMPUTER SECURITY-ESORICS 2010 | 2010年 / 6345卷
关键词
Zero-Knowledge; Protocol Compiler; Formal Verification; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zero-knowledge proofs of knowledge (ZK-PoK) are important building blocks for numerous cryptographic applications. Although ZK-PoK have a high potential impact, their real world deployment is typically hindered by their significant complexity compared to other (non-interactive) crypto primitives. Moreover, their design and implementation are time-consuming and error-prone. We contribute to overcoming these challenges as follows: We present a comprehensive specification language and a compiler for ZK-PoK protocols based on Sigma-protocols. The compiler allows the fully automatic translation of an abstract description of a proof goal into an executable implementation. Moreover, the compiler overcomes various restrictions of previous approaches, e.g., it supports the important class of exponentiation homomorphisms with hidden-order co-domain, needed for privacy-preserving applications such as DAA. Finally, our compiler is certifying, in the sense that it automatically produces a formal proof of the soundness of the compiled protocol for a large class of protocols using the Isabelle/HOL theorem prover.
引用
收藏
页码:151 / +
页数:5
相关论文
共 57 条
[41]  
Fujisaki E, 1997, LECT NOTES COMPUT SC, V1294, P16
[42]  
Goubault-Larrecq J, 2005, LECT NOTES COMPUT SC, V3385, P363
[43]  
Granlund T., 2010, GNU MP BIGNUM LIB
[44]  
GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
[45]  
Han W, 2009, J INF SCI ENG, V25, P517
[46]   Privacy-preserving similarity evaluation and application to remote biometrics authentication [J].
Kikuchi, Hiroaki ;
Nagai, Kei ;
Ogata, Wakaha ;
Nishigaki, Masakatsu .
SOFT COMPUTING, 2010, 14 (05) :529-536
[47]  
Kunz-Jacques S, 2006, LECT NOTES COMPUT SC, V3958, P27
[48]  
Lindell Y, 2008, LECT NOTES COMPUT SC, V5229, P2, DOI 10.1007/978-3-540-85855-3_2
[49]  
Lipmaa H, 2003, LECT NOTES COMPUT SC, V2894, P398
[50]  
MacKenzie P., 2003, Proceedings of the 1 0 th ACM Conference on Computer and Communications Security, P210