Abstract
In this paper, we propose a multi-purpose proof system which allows a user to perform various proof protocols needing to remember only one piece of secret data. These proofs include identity proof, membership proof without revealing one's identity, and combined identity and membership proof. When a user participates in a group, he will obtain a secret witness corresponding to the group's name from some administrator of the group. Using the secret witness, the user can prove his membership in this group. Many secret witnesses can be combined into one piece of secret data. From the secret data, the user can obtain the secret witness of the group he participates in. If the user participates in a new group afterward, he can also easily update his secret data. But the size of the secret data is independent of the number of the groups in which the user participates. Our system satisfies other desirable properties which were not attained by the previously proposed systems.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M.V.D.Burmester, Y.G.Desmedt “Remarks on soundness of proofs “, Electronics Letters, Vol. 25, No. 22, pp.1509–1511, 1989.
D.Chaum, “Security without identification: Transaction systems to make big brother obsolete”, Comm. of the ACM, Vol. 24, No. 10, pp.1030–1044, 1985.
D.Chaum, “Showing credentials without identification: Signatures transferred between unconditionally unlinkable pseudonyms”, Advances in Cryptology, Eurocrypt'85, Springer-Verlag, pp.241–244, 1986.
J.H.Evertse, E.van Heyst “Which new RSA signatures can be computed from some given RSA signatures ?”, Advances in Cryptology-Eurocrypt'90, Springer-Verlag, pp.83–97, 1991.
U.Feige, A.Fiat, A.Shamir, “Zero knowledge proofs of identity”, Journal of Cryptology, Vol.1 pp. 77–94, 1988.
A.Fiat, A.Shamir, “How to prove yourself: practical solutions to identification and signature problems”, Advances in Cryptology-CRYPTO'86, Springer-Verlag, pp. 186–194, 1987.
K.Koyama, “Demonstrating membership of a group using the Shizuya-Koyama-Itoh(SKI) protocol”, Proc. SCIS'89, 1989.
M.Kurosaki, T.Matsumoto, H.Imai, “Simple Methods for Multipurpose Certification”, Proc. SCIS'89, 1989. (in Japanese)
M.Kurosaki, T.Matsumoto, H.Imai, “Methods to individually prove each membership for several groups”, Tech. Rep. of IEICE, ISEC89-18, Japan, 1989. (in Japanese)
K.Ohta, T.Okamoto, “A modification of the Fiat-Shamir scheme”, Advances in Cryptology-CRYPTO'88, Springer–Verlag, pp.232–243, 1989.
K.Ohta, T.Okamoto, K.Koyama “Membership authentication for hierarchy multigroups using the extended Fiat-Shamir Scheme”, Advances in Cryptology-Eurocrypt'90, Springer-Verlag, pp.446–457, 1991.
J.Rompel, “One-way function are necessary and sufficient for signatures,” Proc. 22nd STOC, pp.387–394, 1990.
C.Shu, T.Matsumoto, H.Imai, “How to simultaneously prove yourself and your membership”, Tech. Rep. of IEICE, ISEC90-11, Japan, 1990.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shu, C., Matsumoto, T., Imai, H. (1993). A multi-purpose proof system — for identity and membership proofs. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_34
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive