Zero-knowledge Group Identification and Hidden Group Signature for Smart Cards Using Bilinear Pairings
نویسندگان
چکیده
In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the activeintruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the activeintruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the DiscreteLogarithm Problem in bilinear groups.
منابع مشابه
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watching the communication gains information intended only for the verifier. On the other hand, private coin protocols with fewer than three rounds cannot be zero-knowledge. In this paper, we introduce the notion of bounded-prover zero-knowledge proofs which require only two rounds and can be consider...
متن کاملAdditive Proofs of Knowledge - A New Notion for Non-Interactive Proofs
This paper has two contributions. Firstly, we describe an efficient Non-Interactive Zero-Knowledge (NIZK) Proof of Knowledge (PoK) protocol using bilinear pairings. The protocol assumes the hardness of the Computational Diffie-Hellman (CDH) problem. The prover does not perform any pairing computations while the verifier performs 3 pairing computations. The protocol can be used for identificatio...
متن کاملA New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings
Mutual authentication is an important security property for providing secure remote communication in client-server environment. Up to now, various remote user authentication schemes with smart card using bilinear pairings were proposed by different researchers. Unfortunately, most previously proposed authentication schemes do not provide mutual authentication and session key agreement. This pap...
متن کاملAn ID-Based RFID Privacy Protocol with Weil-Pairing
Identification is a very important usage case of RFID. This kind of usage can be subverted by a specific type of attack, such as counterfeiting, sniffing, tracking and so on. From a certain point of view, to protect an RFID tag’s privacy or security is to keep its ID hidden from an illegal reader. In this paper, we proposed an ID-based privacy protect protocol for an RFID-based smart card. This...
متن کاملA Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. A user authentication scheme is a mechanism to authenticate a remote user over ...
متن کامل