Efficient oblivious proofs of correct exponentiation

被引:0
作者
Jakobsson, M [1 ]
Schnorr, CP [1 ]
机构
[1] Bell Labs, Informat Sci Res Ctr, Murray Hill, NJ 07974 USA
来源
SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY | 1999年 / 23卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the notion of meta-proofs, which, as the name indicates, are proofs about proofs. We employ the notion of meta-proof; to produce a highly efficient oblivous proof of correct exponentiation. It is minimum-knowledge independently of whether the input is valid or not, a property that does not hold for many other protocols (that are zero-knowledge only for valid inputs.) This has direct security implications to multiparty protocols, where the protocols we demonstrate - one interactive and one non-interactive - can be employed to obtain protocol robustness at a low cost. As a result of potential independent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.
引用
收藏
页码:71 / 84
页数:14
相关论文
共 50 条
  • [41] Towards Efficient Proofs of Retrievability
    Xu, Jia
    Chang, Ee-Chien
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [42] Efficient representation and validation of proofs
    Necula, GC
    Lee, P
    THIRTEENTH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1998, : 93 - 104
  • [43] Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
    Xu, Jian
    Jiang, Zhihao
    Wang, Andi
    Wang, Chen
    Zhou, Fucai
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 57 (03): : 589 - 602
  • [44] Efficient elliptic curve exponentiation using mixed coordinates
    Cohen, H
    Miyaji, A
    Ono, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 51 - 65
  • [45] Unifier register to protect an efficient modular exponentiation algorithm
    Tinoco Varela, David
    20TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2016), 2016, 76
  • [47] Some efficient algorithms for the final exponentiation of ηT pairing
    Shirase, Masaaki
    Takagi, Tsuyoshi
    Okamoto, Eiji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 254 - +
  • [48] Efficient subgroup exponentiation in quadratic and sixth degree extensions
    Stam, M
    Lenstra, AK
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 318 - 332
  • [49] Some efficient algorithms for the final exponentiation of ηT pairing
    Shirase, Masaaki
    Takagi, Tsuyoshi
    Okamoto, Eiji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 221 - 228
  • [50] Round-Efficient Oblivious Database Manipulation
    Laur, Sven
    Willemson, Jan
    Zhang, Bingsheng
    INFORMATION SECURITY, 2011, 7001 : 262 - +