Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Algebraic Construction for Zero-Knowledge Sets

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by Micali et al. That is, the schemes employ the Merkle tree as a basic structure and mercurial commitments as the commitment units to nodes of the tree. The proof for any query consists of an authentication chain. We propose in this paper a new algebraic scheme that is completely different from all the existing schemes. Our new scheme is computationally secure under the standard strong RSA assumption. Neither mercurial commitments nor tree structure is used in the new construction. In fact, the prover in our construction commits the desired set without any trapdoor information, which is another key important difference from the previous approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Micali S, Rabin M, Kilian J. Zero-knowledge sets. In Proc. the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Cambridge, MA, USA, 2003, p. 80.

  2. Merkle R C. A certified digital signature. In Proc. Advances in Cryptology—CRYPTO’89, Brassard G (ed.), Santa Barbara, California, United States, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, 1990, 20–24 Aug., 1989, pp.218–238.

  3. Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. In Proc. Advances in Cryptology — CRYPTO’91, Santa Barbara, California, USA, 1992, pp.129–140.

  4. Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets. In Proc. Advances in Cryptology - EUROCRYPT’05, Aarhus, Denmark, 2005, pp.422–439.

    Google Scholar 

  5. Liskov M. Updatable zero-knowledge databases. In Proc. Advances in Cryptology — ASIACRYPT’05, Chennai, India, 2005, pp.174–198.

    Chapter  Google Scholar 

  6. Ostrovsky R, Rackoff C, Smith A. Efficient consistency proofs for generalized queries on a committed database. In Proc ICALP, Turku, Finland, 2004, pp.1041–1053.

    Google Scholar 

  7. Catalano D, Dodis Y, Visconti I. Mercurial commitments: Minimal assumptions and efficient constructions. In Proc. Theory of Cryptography — TCC’06, Lecture Notes in Computer Science, Vol. 3876, New York, Springer-Verlag, 2006, pp.120–144.

  8. Gennaro R, Micali S. Independent zero-knowledge sets. In Proc. ICALP (2), Venice, Italy, 2006, pp.34–45.

  9. Benaloh J C, de Mare M. One-way accumulators: A decentralized alternative to digital signatures. In Proc. Advances in Cryptology — EUROCRYPT’93, Lofthus, Norway, 1994, pp.274–285.

  10. Barić N, Pfitzmann B. Collision-free accumulators and failstop signature schemes without trees. In Proc. Advances in Cryptology — EUROCRYPT’97, Konstanz, Germany, 1997, pp.480–494.

  11. Camenisch J, Lysyanskaya A. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology — CRYPTO’02, Santa Barbara, California, USA, 2002, pp.61–76.

  12. Goodrich M T, Tamassia R, Hasic J. An efficient dynamic and distributed cryptographic accumulator. In Proc. the 5th International Conference on Information Security, London, UK, 2002, pp.372–388.

  13. Li J T, Li N H, Xue R. Universal accumulators with efficient nonmembership proofs. In Proc. Cryptography and Network Security (ACNS07), Lecture Notes in Computer Science, Vol. 4521, Zhuhai, China, Springer-Verlag, 2007, pp.253–269.

  14. Prabhakaran M, Xue R. Statistically Hiding Sets. Submitted to ICALP 2008, 2007.

  15. Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Proc. Advances in Cryptology — CRYPTO’97, Santa Barbara, California, USA, 1997, pp.410–424.

  16. Gennaro R, Halevi S, Rabin T. Secure hash-and-sign signatures without the random oracle. In Proc. Advances in Cryptology — EUROCRYPT’99, Prague, Czech Republic, 1999, pp.123–139.

  17. Fujisaki E, Okamoto T. Statistical zero knowledge protocols to prove modular polynomial relations. In Proc. Advances in Cryptology — CRYPTO’97, Santa Barbara, California, Aug. 1997, pp.16–30.

  18. Cramer R, Shoup V. Signature schemes based on the strong RSA assumption. In Proc. the 6th ACM Conference on Computer and Communications Security (CCS), Singapore, Nov. 1999, pp.46–51.

  19. Shamir A. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1983 1(1): 38.

    Article  MathSciNet  Google Scholar 

  20. Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 1993, pp.62–73.

  21. Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In Proc. Advances in Cryptology — CRYPTO’86, Santa Barbara, California, USA, 1987, pp.186–194.

  22. Santis A D, Micali S, Persiano G. Non-interactive zero-knowledge proof systems. In Proc. RYPTO’87, Pomerance C (ed.), Santa Barbara, California, United States, Lecture Notes in Computer Science, Springer-Verlag, 1988, Vol. 293, pp.52–72.

  23. Algesheimer J, Camenisch J, Shoup V. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In Proc. Advances in Cryptology — CRYPTO’02, Santa Barbara, California, USA, 2002, pp.417–432.

  24. Sander T. Efficient accumulators without trapdoor extended abstracts. In Proc. ICICS, Sydney, Australia, Varadharajan V, Mu Y (eds.), Lecture Notes in Computer Science, Vol. 1726, Springer, 1999, pp.252–262.

  25. Chaum C, Evertse J H, van de Graaf J, Peralta R. Demonstrating possession of a discrete logarithm without revealing it. In Proc. Advances in Cryptology — CRYPTO’86, Santa Barbara, California, USA, 1987, pp.200–212.

  26. Schnorr C P. Efficient signature generation by smart cards, Journal of Cryptology, 1991, 4: 161–174.

    Article  MATH  Google Scholar 

  27. Feige U, Fiat A, Shamir A. Zero knowledge proofs of identity. Journal of Cryptology, 1988, 1(2): 77–94.

    Article  MATH  MathSciNet  Google Scholar 

  28. Granville A. Harold Cramér and the distribution of prime numbers. Scandanavian Actuarial Journal, 1995, 1: 12–28.

    MathSciNet  Google Scholar 

  29. Shoup V. Practical threshold signatures. In Proc. Advances in Cryptology — EUROCRYPT’00, Bruges, Belgium, 2000, pp.207–220.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Xue.

Additional information

This work is supported by NSF of USA under Grant Nos. IIS-0430274, and CCR-0325951, and sponsors of CERIAS. Rui Xue is partially supported by the Fund of the China Scholarship Council, partially by National Natural Science Foundation of China under Grant No. 60773029, National Grand Fundamental Research 973 Program of China under Grant No. 2007CB311202, and the National High Technology Research and Development 863 Program of China under Grant No. 2006AA01Z427.

Most of this work was done while Jiang-Tao Li and Rui Xue were at Purdue University.

Electronic Supplementary Material

Below is the link to the electronic supplementary material.

(PDF 81.8 kb)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xue, R., Li, NH. & Li, JT. Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23, 166–175 (2008). https://doi.org/10.1007/s11390-008-9119-x

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-008-9119-x

Keywords

Navigation