The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant

نویسندگان

  • Christophe Tartary
  • Huaxiong Wang
چکیده

In this paper, we demonstrate that the construction proposed by Lan Nguyen at CT-RSA’05 does lead to a cryptographic accumulator which is not collision resistant.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of bilinear pairing-based accumulator for identity escrowing

An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which is not collision resistant. Second we show that we can provide collision-resistance by updating the adversary model appropriately. Finally, we propose an improvement on Nguyen’s identity escrow sche...

متن کامل

Improved ID-based Ring Signature Scheme with Constant-size Signatures

Ring signature enable a user to sign a message on behalf of the ring, without revealing the actual signer. Constant-size ring signature is the ring scheme that the size of the signature does not grow with the size of the ring(or group), so it is practical for large rings. In this paper we use the Collision Resistant Accumulator from bilinear pairing to construct an identity-based ring signature...

متن کامل

Supporting Non-membership Proofs with Bilinear-map Accumulators

In this short note, we present an extension of Nguyen’s bilinear-map based accumulator scheme [8] to support non-membership witnesses and corresponding non-membership proofs, i.e., cryptographic proofs that an element has not been accumulated to a given set. This complements the non-membership proofs developed by Li et al. [7] for the RSA accumulator [2, 3, 5], making the functionality of the b...

متن کامل

Attribute-based encryption implies identity-based encryption

In this short paper we formally prove that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, we show how an attribute-based encryption scheme which admits, at least, AND policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural...

متن کامل

Real-World Performance of Cryptographic Accumulators

Cryptographic accumulators have often been proposed for use in security protocols, and the theoretical runtimes of algorithms using them have been shown to be reasonably efficient, but their performance in the real world has rarely been measured. In this paper I analyze the performance differences between two cryptographic accumulator constructions, RSA accumulators and bilinear-map accumulator...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006