Batch zero-knowledge proof and verification and its applications

  • Authors:
  • Kun Peng;Colin Boyd;Ed Dawson

  • Affiliations:
  • Information Security Institute, Queensland University of Technology, Australia;Information Security Institute, Queensland University of Technology, Australia;Information Security Institute, Queensland University of Technology, Australia

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The batch verification technique of Bellare et al. is extended to verification of several frequently employed zero-knowledge proofs. The new techniques are correct, sound, efficient, and can be widely applied. Specific applications are discussed in detail, including batch ZK proof and verification of validity of encryption (or reencryption) and batch ZK proof and verification of validity of decryption. Considerable efficiency improvements are gained in these two applications without compromising security. As a result, efficiency of the practical cryptographic systems (such as mix networks) based on these two applications is dramatically improved.