Skip to main content

A multi-purpose proof system — for identity and membership proofs

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT '91 (ASIACRYPT 1991)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 739))

Included in the following conference series:

  • 197 Accesses

Abstract

In this paper, we propose a multi-purpose proof system which allows a user to perform various proof protocols needing to remember only one piece of secret data. These proofs include identity proof, membership proof without revealing one's identity, and combined identity and membership proof. When a user participates in a group, he will obtain a secret witness corresponding to the group's name from some administrator of the group. Using the secret witness, the user can prove his membership in this group. Many secret witnesses can be combined into one piece of secret data. From the secret data, the user can obtain the secret witness of the group he participates in. If the user participates in a new group afterward, he can also easily update his secret data. But the size of the secret data is independent of the number of the groups in which the user participates. Our system satisfies other desirable properties which were not attained by the previously proposed systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. M.V.D.Burmester, Y.G.Desmedt “Remarks on soundness of proofs “, Electronics Letters, Vol. 25, No. 22, pp.1509–1511, 1989.

    Google Scholar 

  2. D.Chaum, “Security without identification: Transaction systems to make big brother obsolete”, Comm. of the ACM, Vol. 24, No. 10, pp.1030–1044, 1985.

    Article  Google Scholar 

  3. D.Chaum, “Showing credentials without identification: Signatures transferred between unconditionally unlinkable pseudonyms”, Advances in Cryptology, Eurocrypt'85, Springer-Verlag, pp.241–244, 1986.

    Google Scholar 

  4. J.H.Evertse, E.van Heyst “Which new RSA signatures can be computed from some given RSA signatures ?”, Advances in Cryptology-Eurocrypt'90, Springer-Verlag, pp.83–97, 1991.

    Google Scholar 

  5. U.Feige, A.Fiat, A.Shamir, “Zero knowledge proofs of identity”, Journal of Cryptology, Vol.1 pp. 77–94, 1988.

    Google Scholar 

  6. A.Fiat, A.Shamir, “How to prove yourself: practical solutions to identification and signature problems”, Advances in Cryptology-CRYPTO'86, Springer-Verlag, pp. 186–194, 1987.

    Google Scholar 

  7. K.Koyama, “Demonstrating membership of a group using the Shizuya-Koyama-Itoh(SKI) protocol”, Proc. SCIS'89, 1989.

    Google Scholar 

  8. M.Kurosaki, T.Matsumoto, H.Imai, “Simple Methods for Multipurpose Certification”, Proc. SCIS'89, 1989. (in Japanese)

    Google Scholar 

  9. M.Kurosaki, T.Matsumoto, H.Imai, “Methods to individually prove each membership for several groups”, Tech. Rep. of IEICE, ISEC89-18, Japan, 1989. (in Japanese)

    Google Scholar 

  10. K.Ohta, T.Okamoto, “A modification of the Fiat-Shamir scheme”, Advances in Cryptology-CRYPTO'88, Springer–Verlag, pp.232–243, 1989.

    Google Scholar 

  11. K.Ohta, T.Okamoto, K.Koyama “Membership authentication for hierarchy multigroups using the extended Fiat-Shamir Scheme”, Advances in Cryptology-Eurocrypt'90, Springer-Verlag, pp.446–457, 1991.

    Google Scholar 

  12. J.Rompel, “One-way function are necessary and sufficient for signatures,” Proc. 22nd STOC, pp.387–394, 1990.

    Google Scholar 

  13. C.Shu, T.Matsumoto, H.Imai, “How to simultaneously prove yourself and your membership”, Tech. Rep. of IEICE, ISEC90-11, Japan, 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Ronald L. Rivest Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shu, C., Matsumoto, T., Imai, H. (1993). A multi-purpose proof system — for identity and membership proofs. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-57332-1_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57332-6

  • Online ISBN: 978-3-540-48066-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics