Efficient oblivious proofs of correct exponentiation

被引:0
作者
Jakobsson, M [1 ]
Schnorr, CP [1 ]
机构
[1] Bell Labs, Informat Sci Res Ctr, Murray Hill, NJ 07974 USA
来源
SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY | 1999年 / 23卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the notion of meta-proofs, which, as the name indicates, are proofs about proofs. We employ the notion of meta-proof; to produce a highly efficient oblivous proof of correct exponentiation. It is minimum-knowledge independently of whether the input is valid or not, a property that does not hold for many other protocols (that are zero-knowledge only for valid inputs.) This has direct security implications to multiparty protocols, where the protocols we demonstrate - one interactive and one non-interactive - can be employed to obtain protocol robustness at a low cost. As a result of potential independent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.
引用
收藏
页码:71 / 84
页数:14
相关论文
共 50 条
  • [31] An efficient montgomery exponentiation algorithm for cryptographic applications
    Wu, CL
    Lou, DC
    Chang, TJ
    INFORMATICA, 2005, 16 (03) : 449 - 468
  • [32] Efficient exponentiation using weakly dual basis
    Wu, HP
    Hasan, MA
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2001, 9 (06) : 874 - 879
  • [33] An efficient quantum oblivious transfer protocol
    Sarkar, Sushmita
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    Mesnager, Sihem
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14037 - 14048
  • [34] A framework for efficient and composable oblivious transfer
    Peikert, Chris
    Vaikuntanathan, Vinod
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 554 - 571
  • [35] Efficient, Oblivious Data Structures for MPC
    Keller, Marcel
    Scholl, Peter
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 506 - 525
  • [36] More Efficient Oblivious Transfer Extensions
    Asharov, Gilad
    Lindell, Yehuda
    Schneider, Thomas
    Zohner, Michael
    JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 805 - 858
  • [37] Almost Correct Invariants: Synthesizing Inductive Invariants by Fuzzing Proofs
    Lahiri, Surnit
    Roy, Subhajit
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 352 - 364
  • [38] NESTED POLYNOMIALS AND EFFICIENT EXPONENTIATION ALGORITHMS FOR CALCULATORS
    KALMAN, D
    COLLEGE MATHEMATICS JOURNAL, 1985, 16 (01): : 57 - 60
  • [39] More Efficient Oblivious Transfer Extensions
    Gilad Asharov
    Yehuda Lindell
    Thomas Schneider
    Michael Zohner
    Journal of Cryptology, 2017, 30 : 805 - 858
  • [40] Efficient oblivious transfer with membership verification
    Liu, Weiwei
    Sun, Da-Zhi
    Tian, Yangguang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09):