Communication-efficient anonymous group identification
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Attacking and Repairing Batch Verification Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Receipt-Free Sealed-Bid Auction
ISC '02 Proceedings of the 5th International Conference on Information Security
Batch zero-knowledge proof and verification and its applications
ACM Transactions on Information and System Security (TISSEC)
Batch Processing for Proofs of Partial Knowledge and Its Applications
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Batch verification of validity of bids in homomorphic e-auction
Computer Communications
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient concurrent zero-knowledge in the auxiliary string model
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Efficient bid validity check in ElGamal-based sealed-bid e-auction
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Batch range proof for practical small ranges
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
A secure and efficient proof of integer in an interval range
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Batch proofs of partial knowledge
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
When multiple knowledge statements linked with "OR" logic have to be proved and verified, the existing solution is the proof technique by Cramer et al , in which multiple proof and verification protocols are performed in parallel. It is pointed out in this paper that the highly strong soundness in Cramer et al's solution is only theoretically valuable and not needed in many applications, which suffer from its low efficiency. So batch proof and verification, a cryptographic tool to improve efficiency by reducing strength of soundness with only theoretic value to a practical level, is employed to modify Cramer et al's solution. More precisely, the multiple instances of proof and verification in Cramer et al's solution are batched in this paper. As existing batch ZK (zero knowledge) proof and verification techniques can only deal with proof and verification of statements linked with AND logic, a new batch proof and verification technique called batch ZK proof and verification of OR logic is designed to overcome this limit. It is the first batch cryptographic technique to handle multiple statements linked with OR logic. This new technique employs only one single modified proof and verification protocol to prove and verify multiple knowledge statements linked with OR logic, so greatly improves efficiency of the proof and verification technique by Cramer et al . It is the most efficient solution to the question raised by Cramer et al . Strength of soundness of the new proof and verification protocol is reduced to a level still strong enough for most practical applications. Namely, an appropriate trade-off is made between soundness and efficiency to design a more practical solution to ZK proof and verification of OR Logic. The new scheme is analysed in a security model called van Σ protocol, an extension of Σ protocol used in the technique by Cramer et al . The analysis illustrates that satisfactory security and performance are achieved in the new scheme.