2014
DOI: 10.1007/978-3-642-54631-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting

Abstract: Abstract. Since their introduction in 1985, by Goldwasser, Micali and Rackoff, followed by Feige, Fiat and Shamir, zero-knowledge proofs have played a significant role in modern cryptography: they allow a party to convince another party of the validity of a statement (proof of membership) or of its knowledge of a secret (proof of knowledge). Cryptographers frequently use them as building blocks in complex protocols since they offer quite useful soundness features, which exclude cheating players. In most of mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Trusted Computing (TC) is a security mechanism for IaaS where execution of a virtual machine (VM) instance can be run in a secure manner. On the other hand, the virtual machines need to be up to date from the view of both the CSP and the customer side (Proudler et al 2014;Canard et al 2014). …”
Section: Guarantee Of Imagementioning
confidence: 99%
“…Trusted Computing (TC) is a security mechanism for IaaS where execution of a virtual machine (VM) instance can be run in a secure manner. On the other hand, the virtual machines need to be up to date from the view of both the CSP and the customer side (Proudler et al 2014;Canard et al 2014). …”
Section: Guarantee Of Imagementioning
confidence: 99%
“…However, this scheme is not compatible with the TPM 2.0 specification [5]. Canard et al [31] proposed an efficient approach to delegate some computation of the TPM to the host in interactive zeroknowledge proofs of knowledge. Using their method to the proof of knowledge for pseudonymous signatures in the DAA scheme [20], they show that the online signing cost of TPM can be reduced to one exponentiation.…”
Section: Related Workmentioning
confidence: 99%
“…For the case of bsn = ⊥, we propose a technique of delegable pseudonyms, which is inspired by Canard et al's method [31] on delegation of zero-knowledge proofs of knowledge. Specifically, a pseudonym on a basename bsn is computed as K = e(ḡ, H G2 (bsn)) gsk , where H G2 : {0, 1} * → G 2 is a random oracle.…”
Section: A High-level Ideasmentioning
confidence: 99%