Anonymous deniable identification in ephemeral setup and leakage scenarios

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present anonymous identification schemes, where a verifier can check that the user belongs to an ad-hoc group of users (just like in case of ring signatures), however a transcript of a session executed between a user and a verifier is deniable: neither the verifier nor the prover can convice a third party that a given user has been involved in a session but also he cannot prove that any user has been interacting with the verifier. Our realization of this idea is based on Schnorr identification scheme and ring signatures. We present two constructions, a simple 1-of-n case and a more advanced k-of-n, where the prover must use at least k private keys. They are immune to leakage of ephemeral keys and with minor modifications this property can be sacrificed for a simpler construction.

Cite

CITATION STYLE

APA

Krzywiecki, Ł., Kutyłowski, M., Pezda, J., & Słowik, M. (2019). Anonymous deniable identification in ephemeral setup and leakage scenarios. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11527 LNCS, pp. 320–323). Springer Verlag. https://doi.org/10.1007/978-3-030-20951-3_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free