Proof-of-knowledge of representation of committed value and its applications

Man Ho Allen Au, Willy Susilo, Yi Mu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

13 Citations (Scopus)

Abstract

We present a zero-knowledge argument system of representation of a committed value. Specifically, for commitments C = Commit1(y), D = Commit2(x), of value y and a tuple x = x1,..., xL), respectively, our argument system allows one to demonstrate the knowledge of (x,y) such that x is a representation of y to bases h1, ..., hL. That is, y = h1x1⋯hLxL. Our argument system is zero-knowledge and hence, it does not reveal anything such as x or y. We note that applications of our argument system are enormous. In particular, we show how round-optimal cryptography systems, where privacy is of a great concern, can be achieved. We select three interesting applications with the aim to demonstrate the significance our argument system. First, we present a concrete instantiation of two-move concurrently-secure blind signature without interactive assumptions. Second, we present the first compact e-cash with concurrently-secure withdrawal protocol. Finally, we construct two-move traceable signature with concurrently-secure join. On the side note, we present a framing attack against the original traceable signature scheme within the original model.
Original languageEnglish
Title of host publicationInformation Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings
Pages352-369
Number of pages18
DOIs
Publication statusPublished - 13 Dec 2010
Externally publishedYes
Event15th Australasian Conference on Information Security and Privacy, ACISP 2010 - Sydney, NSW, Australia
Duration: 5 Jul 20107 Jul 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6168 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th Australasian Conference on Information Security and Privacy, ACISP 2010
Country/TerritoryAustralia
CitySydney, NSW
Period5/07/107/07/10

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Proof-of-knowledge of representation of committed value and its applications'. Together they form a unique fingerprint.

Cite this