Abstract
In this paper, we investigate the discrepancy between a serial version and a parallel version of zero-knowledge protocols, and clarify the information “leaked” in the parallel version, which is not zero-knowledge unlike the case of the serial version. We consider two sides: one negative and the other positive in the parallel version of zero-knowledge protocols, especially of the Fiat-Shamir scheme.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Brassard, G. and Crépeau, C., “Sorting out zero-knowledge,” Advances in Cryptology — Eurocrypto’ 89, Lecture Notes in Computer Science 434, Springer-Verlag, Berlin, pp.181–191 (1990).
Brassard, G., Chaum, D., and Crépeau, C., “Minimum Disclosure Proofs of Knowledge,” Journal of Computer and System Sciences, Vol.37, No.2, pp.156–189 (October 1988).
Brickell, E. F. and McCurley, K.S “An Interactive Identification Scheme Based on Discrete Logarithms and Factoring,” Journal of Cryptology, Vol.5, pp.29–40 (1992).
Bellare, M., Micali, S., and Ostrovsky, R., “Perfect Zero-Knowledge in Constant Rounds,” ACM Annual Symposium on Theory of Computing, pp.482–493 (May 1990).
Chaum, D. and van Antwerpen, H “Undeniable Signatures,” Advances in Cryptology — Crypto’89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.212–216 (1989).
Chaum, D., “Blind signature for Untraceable Payments,” Advances in Cryptology — Crypto’82, Plenum Press, New York, pp.199–203 (1983).
Desmedt, Y., “Major security problems with the “unforgeable” (Feige-) Fiat-Shamir proofs of identity and how to overcome them,” In Securicom 88, 6th worldwide congress on computer and communications security and protection, pp.147–159, (March 1988).
Desmedt, Y., Goutier, C. and Bengio, S.: “Special Uses and abuses of the Fiat-Shamir Passport Protocol,” Advances in Cryptology — Crypto’87, Lecture Notes in Computer Science 293, Springer-Verlag, Berlin, pp.21–39 (1988).
Diffie, W., and Hellman, M. “New Directions in Cryptology”, IEEE Trans. on Info. Technology, vol. IT-22,6 (1976) pp.644–654 (1976).
Feige, U. and Shamir, A., “Witness Indistinguishable and Witness Hiding Protocols,” ACM Annual Symposium on Theory of Computing, pp.416–426 (May 1990).
Fiat, A. and Shamir, A., “How to Prove Yourself,” Advances in Cryptology — Crypto’86, Lecture Notes in Computer Science 263, Springer-Verlag, Berlin, pp.186–199 (1987).
Feige, U., Fiat, A., and Shamir, A., “Zero-Knowledge Proofs of Identity,” ACM Annual Symposium on Theory of Computing, pp.210–217 (May 1988), the final version: Journal of Cryptology, Vol.1, pp.179–194 (1988). v
Goldreich, O. and Krawczyk, H., “On the Composition of Zero-Knowledge Proof Systems,” ICALP’90, Lecture Notes in Computer Science 443, Springer-Verlag, Berlin, pp.268–282 (1990).
Goldwasser, S., Micali, S., and Rackoff, C., “The Knowledge Complexity of Interactive Proof Systems,” SIAM Journal of Computing, Vol.18, No.1, pp.186–208 (February 1989).
Goldreich, O., Micali, S., and Wigderson, A., “Proofs that Yield Nothing But Their Validity and a Methodology of Cryptographic Protocol Design,” IEEE Annual Symposium on Foundations of Computer Science, pp.174–187 (October 1986).
Goldreich, O. and Oren, Y., “Definitions and Properties of Zero-Knowledge Proof Systems,” Technical Report #610, Technion — Israel Institute of Technology, Department of Computer Science, Haifa, Israel (February 1990).
Guillou, L.C., and Quisquater, J.J, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory,” Advances in Cryptology — Eurocrypt’88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.123–128 (1988).
L.C. Guillou, and J.J. Quisquater, “A “Paradoxical” Identity-Based Signature Scheme Resulting from Zero-Knowledge,” Advances in Cryptology — Crypto’88, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, pp.216–231 (1990).
International Standard, “Banking — Approved algorithm for message authentication —,” ISO 8731-1 (1987).
Okamoto, T., “Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,” Entenxed Abstract for CRYPTO’92 (1992).
Ohta, K., and Okamoto, T., “A Modification of the Fiat-Shamir Scheme,” Advances in Cryptology — Crypto’88, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, pp.232–243 (1990).
Okamoto, T., and Ohta, K., “Divertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducibility,” Advances in Cryptology — Eurocrypt’89, Lecture Notes in Computer Science 434, Springer-Verlag, Berlin, pp.134–149 (1989).
Okamoto, T., and Ohta, K., “How to utilize the randomness of Zero-Knowledge Proofs,” Advances in Cryptology — Crypto’90, Lecture Notes in Computer Science 537, Springer-Verlag, Berlin, pp.456–475 (1991).
Ohta, K., Okamoto, T., and Fujioka, A., “Secure bit commitment function against divertibility,” EUROCRYPTO’92 Extended Abstracts, (May 1992).
Sakurai, K. and Itoh, T “Testifiable Identification and Its application to a Digital Credit Card,” Proc. of the 1992 Symposium on Cryptography and Information Security, 1D, Japan (April 1992).
Schnorr, C. P., “Efficient identification and signatures for smart cards,” Advances in Cryptology — Crypto’89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.239–252 (1990).
Tompa, M. and Woll, H., “Random Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information,” IEEE Annual Symposium on Foundations of Computer Science, pp.472–482 (October 1987).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sakurai, K., Itoh, T. (1993). On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols. In: Brickell, E.F. (eds) Advances in Cryptology — CRYPTO’ 92. CRYPTO 1992. Lecture Notes in Computer Science, vol 740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48071-4_17
Download citation
DOI: https://doi.org/10.1007/3-540-48071-4_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57340-1
Online ISBN: 978-3-540-48071-6
eBook Packages: Springer Book Archive