Abstract
We present a batch version of Schnorr’s identification scheme. Our scheme uses higher degree polynomials that enable the execution of several Schnorr’s protocol at a cost very close to that of a single execution. We present a full proof of security that our scheme is secure against impersonation attacks.
The main application of this result is a very efficient way for a party to prove that it holds several secret keys (i.e. identities), where each identity is linked to a specific authorization. This approach protects the privacy of the prover allowing her to prove only the required set of authorizations required to perform a given task, without disclosing whether she is in possession of other privileges or not.
We also show that our scheme is suitable to be implemented on low-bandwidth communication devices. We present an implementation of a smart card employing recent technology for the use of LEDs (Light Emitting Diodes) for bidirectional communication. Another contribution of our paper is to show that this new technology allows the implementation of strong cryptography.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bellare, M., Garay, J., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236–250. Springer, Heidelberg (1998)
Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)
Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more RSA Inversion Problem. Financial Cryptography (2001), Final version available at http://eprint.iacr.org/2002/002
Bellare, M., Palacio, A.: GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 162. Springer, Heidelberg (2002)
Burmester, M.: A remark on the efficiency of identification schemes. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 493–495. Springer, Heidelberg (1991)
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Camenisch, J., Lysyanskaya, A.: Signature schemes with efficient protocols. In: Security in Communication Networks Workshop (2002)
Chaum, D.: Zero knowledge undeniable signatures. Advances in Cryptology - CRYPTO 1990, pp. 458–464 (1990)
Cramer, R., Damgard, I., MacKenzie, P.D.: Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354–372. Springer, Heidelberg (2000)
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
Cramer, R., Shoup, V.: Signature schemes based on the Strong RSA assumption. In: 6th ACM Conference on Computer and Communication Security (1999)
Davies, D.W., Price, W.L.: Security for computer networks. Wiley, Chichester (1989)
de Rooij, P.: On the security of the Schnorr scheme using preprocessing. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 71–80. Springer, Heidelberg (1991)
Dietz, P., Yerazunis, W., Leigh, D.: Very low-cost sensing and communication using bidirectional LEDs. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 175–191. Springer, Heidelberg (2002) (to appear), http://www.merl.com/papers/TR2003-35/ (patent pending)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Dolev, D., Dwork, C., Naor, M.: Non-malleable Cryptography. SIAM J. Comp. 30(2), 391–437 (2000)
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology 1, 77–94 (1988)
Ford, W.: Computer communications security: principles, standard protocols and techniques. Prentice-Hall, Englewood Cliffs (1994)
Gennaro, R., Halevi, S., Rabin, T.: Secure Hash-and-Sign Signatures Without the Random Oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123–139. Springer, Heidelberg (1999)
Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based undeniable signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 132–149. Springer, Heidelberg (1997); Also in Journal of Cryptology 13, 397–416 (2000)
Gennaro, R., Leigh, D., Sundaram, R., Yerazunis, W.: Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. Tech Report (2004), http://www.ccs.neu.edu/~koods/papers.html
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th Annual ACM Symposium on Theory of Computing, pp. 291–304 (1985)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing 17(2), 281–308 (1988)
Guillou, L.C., Quisquater, J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)
Guillou, L.C., Ugon, M.: Smart card: a highly reliable and portable security device. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 464–479. Springer, Heidelberg (1986)
Guillou, L.C., Ugon, M., Quisquater, J.-J.: The smart card: a standardized security device dedicated to public cryptography. Contemporary Cryptology: The Science of Information Integrity, pp. 561–613. IEEE, Los Alamitos (1992)
Helms, N.: Bright LEDs power headlights. Electronics News (2003), http://www.dialelectronics.com.au/articles/1e/0c01631e.asp
Kahn, D.: he codebreakers: the story of secret writing. Macmillan, Basingstoke (1967)
LaMacchia, B.A., Odlyzko, A.M.: Computation of discrete logarithms in prime fields. Designs, Codes and Cryptography 1, 46–62 (1991)
Mims, F.M.: Siliconnections: Coming of age in the electronic era. McGraw Hill, New York (1986)
Mims, F.M.: LED circuits and projects. H. W. Sams and Co. (1993)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997), http://www.cacr.math.uwaterloo.ca/hac/
Morris, R., Thompson, K.: Password security: a case history. Communications of the ACM 22, 594–597 (1979)
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21, 993–999 (1978)
Quisquater, J.-J., Guillou, L., Berson, T.: How to explain zero-knowledge protocols to your children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1989)
Schneier, B.: Applied cryptography. Wiley, Chichester (1996)
Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 161–174 (1991)
Strang, G.: Linear algebra and its applications. Harcourt Brace (1988)
Tedeschi, W.: Trying to shift shape of PC screens, http://www.nytimes.com/2002/11/04/technology/04ECOM.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gennaro, R., Leigh, D., Sundaram, R., Yerazunis, W. (2004). Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. In: Lee, P.J. (eds) Advances in Cryptology - ASIACRYPT 2004. ASIACRYPT 2004. Lecture Notes in Computer Science, vol 3329. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30539-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-30539-2_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23975-8
Online ISBN: 978-3-540-30539-2
eBook Packages: Springer Book Archive