期刊文献+

一种构造并发不可延展零知识的新方法 被引量:2

A New Construction of Concurrent Non-malleable Zero-Knowledge
下载PDF
导出
摘要 构造了一个新的并发不可延展的零知识论证系统,具有更好的鲁棒性.新方案基于Feige-Shamir结构而设计,以具有鲁棒性的不可延展承诺方案以及巧妙设计的证据不可区分性证明为基本组件,来实现并发不可延展性和鲁棒性.此外,对敌手视图的模拟借助了"茫然模拟"的策略.当与其它协议并发组合时,该方案更易于分析和应用.基于单向函数假设,该方案的轮复杂性为超对数. This paper focuses on the robustness of concurrent non-malleable zero-knowledge.Existing concurrent non-malleable zero-knowledge protocols either apply non-black-box simulation techniques,or employ black-box simulation but incorporate a zero-knowledge sub-protocol.Hence when concurrently composed with other protocols,security of these protocols is not preserved or hard to argue.Following the well-known Feige-Shamir style,this paper presents a new construction for concurrent non-malleable zero-knowledge argument system,which is easily composed.This protocol takes the robust non-malleable commitment scheme introduced by Lin and Pass in STOC 2009 and specially designed witness indistinguishable proofs as basic components to achieve non-malleability and robustness.Moreover,this paper applies the "oblivious simulation" strategy to simulate the view of the adversary,and the proof technique introduced by Lin et al.in Crypto 2010 to analyze the indistinguishability of simulation.Since witness indistinguishability is closed under concurrent composition,the commitment sub-protocol is robust and the simulation is oblivious,when concurrently composed with other protocols,this protocol is easier to work with and analyze.Based on the one-way function assumption,the round complexity of this protocol is super-logarithmic.
作者 李睿 徐秋亮
出处 《计算机学报》 EI CSCD 北大核心 2012年第4期682-692,共11页 Chinese Journal of Computers
基金 国家自然科学基金(61173139) 山东省自然科学基金重点项目(ZR2011FZ005) 教育部博士点基金(20110131110027) 山东省自然科学基金(ZR2010FM045)资助~~
关键词 零知识 并发不可延展性 鲁棒性 单向函数假设 茫然模拟 zero-knowledge concurrent non-malleability robustness oneway-function assumption oblivious simulation
  • 引文网络
  • 相关文献

同被引文献26

  • 1李红达,徐海霞,李宝,冯登国.NP问题的常数轮知识的零知识证明系统[J].中国科学:信息科学,2010,40(9):1197-1210. 被引量:1
  • 2刘景美,王新梅.Schnorr签名方案的一种攻击[J].计算机科学,2006,33(7):141-142. 被引量:4
  • 3张虎强,洪佩琳,李津生,熊继平.一种零知识证明协议的安全分析与改进[J].信息安全与通信保密,2006,28(11):163-166. 被引量:4
  • 4肖如良.超椭圆曲线密码体制的理论与实现[M].北京:经济管理出版社,2006:44-52.
  • 5邓锬.零知识证明理论研究进展[C]//中国密码学发展报告2010.北京:电子工业出版社,2011:68 -85.
  • 6PENG K. Attack against a batch zero-knowledge proof system[ J].Information Security, 2012,6(1):1 -5.
  • 7ALMUHAMMADI S, NEUMAK C. Security and privacy using one-round zero-knowledge proofs [ C ] // CEC,05: Proceedings of theSeventh IEEE International Conference on E-Commerce Technology.Piscataway: IEEE, 2005:435 -438.
  • 8陈钟.信息安全引论:公钥密码学的数学基础[R/OL].[2012-11-01]. http: //www. doc88. com/p-091107299401. html.
  • 9Abraham J. A survey of intrusion detection for ad-hoc network [ J ]. Journal of global research in computer science, 2013,4 (4) :182-185.
  • 10Noorman J, Agten P, Daniets W, et al. Saneus : Low-cost trust- worthy extensible networked devices with a zero-software trus- ted computing base [ C ]//Proc of 22nd USENIX security sym- posium. [ s. 1. ]: [ s. n. ] ,2013.

引证文献2

二级引证文献1

;
使用帮助 返回顶部