Zero-knowledge proof protocol is a basic cryptographic technique. And zero-knowledge proof of double discrete logarithm has some particular properties, so it has been widely applied in many security systems. But the efficient problem of zero-knowledge proof of double discrete logarithm has not been solved to this day, since there are some special difficulties in computing this kind of knowledge proof. Hence, the time complexity and the space complexity of existing schemes are all O(k), where k is a security parameter. After redesigning the basic construction of knowledge proof, we provide a new zero-knowledge proof of double discrete logarithm, which is the first scheme with O(1) time complexity and O(1) space complexity. If introducing an off-line TTP (trusted third party), we can provide two additional zero-knowledge proof schemes of double discrete logarithm, one is even more efficient than the first one, the other one solves another open problem, which is how to efficiently prove the equality of double discrete logarithms in zero-knowledge way, and the existing techniques cannot solve this problem. We also provide the detailed security proofs of our designs and efficiency analysis, comparing with the existing schemes. The significant improvement in efficiency of this basic cryptographic technique is also helpful for many security systems.
목차
Abstract 1. Introduction 2. Preliminaries 2.1. Cryptographic Assumptions 2.2. The Representation Problem [45] 2.3. Number-Theoretic Foundations 2.4. The Schnorr Identification Protocol [46] 2.5. Signatures Based on Proof of Knowledge [9, 10] 3. New Zero-knowledge Proof of Knowledge of Double Discrete Logarithm 3.1. Basic Construction 3.2. New Zero-knowledge Proof of Knowledge of Double Discrete Logarithm 3.3. New SPK of Double Discrete Logarithm 4. Efficiency Analysis 5. Conclusion Acknowledgements References
키워드
zero-knowledge proof of double discrete logarithmsignature based on proofs of knowledgeconstant complexityproof of equality of double discrete logarithms
저자
Bin Lian [ School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China, Ningbo Institute of Technology, Zhejiang University, Ningbo, China ]
Gongliang Chen [ School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China ]
Jianhua Li [ School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.9 No.3