2009
DOI: 10.1007/978-3-642-00862-7_20
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems

Abstract: We present the first dynamic universal accumulator that allows (1) the accumulation of elements in a DDH-hard group G and (2) one who knows x such that y = g x has-or has not-been accumulated, where g generates G, to efficiently prove her knowledge of such x in zero knowledge, and hence without revealing, e.g., x or y. We introduce the Attribute-Based Anonymous Credential System, which allows the verifier to authenticate anonymous users according to any access control policy expressible as a formula of possibl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(68 citation statements)
references
References 22 publications
0
68
0
Order By: Relevance
“…The use of such a primitive gives an authenticated dictionary with constant communication and constant verification complexity, while maintaining all other complexities logarithmic. To the best of our knowledge, this is the first optimal authenticated dictionary to appear in the literature, as it exactly matches the respective complexities 3 (update time, query time, answer size) of the optimal dictionary data structure (e.g., implemented as a red-black tree).…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…The use of such a primitive gives an authenticated dictionary with constant communication and constant verification complexity, while maintaining all other complexities logarithmic. To the best of our knowledge, this is the first optimal authenticated dictionary to appear in the literature, as it exactly matches the respective complexities 3 (update time, query time, answer size) of the optimal dictionary data structure (e.g., implemented as a red-black tree).…”
Section: Introductionmentioning
confidence: 90%
“…An authenticated data structure that combines hierarchical hashing with the accumulation-based scheme of [21] is presented in [22] and accumulators using other cryptographic primitives (e.g., general groups with bilinear pairings) the security of which is based on other assumptions (e.g., hardness of strong Diffie-Hellman problem) are introduced in [11,32,42]. Non-membership proofs for accumulators are presented in [3,16,26]. Finally, authenticated hash tables that use the RSA accumulator are introduced in [35].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In CRYPTO 2002, Camenisch and Lysyanskaya [9] introduced dynamic accumulators, that enable updating the accumulation value when inputs are dynamically added or deleted, such that the cost of an update is independent of the number of accumulated inputs. However, all dynamic accumulator constructions that appeared since then (e.g., [3,8,9,26,32]) share one common limitation: Computing a witness, in absence of the trapdoor information (which has many practical applications, e.g., [36]), takes at least linear time. We observe that our construction comprises a dynamic accumulator that does not have this limitation: Specifically, for a set of elements X ⊆ {0, 1, .…”
Section: Applicationsmentioning
confidence: 99%
“…We thus achieve an exponential improvement for many common queries in the prover's running time. 3. Expressiveness.…”
Section: Introductionmentioning
confidence: 99%