Strongly Deniable Identification Schemes Immune to Prover’s and Verifier’s Ephemeral Leakage

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we consider Identification Schemes (IS) in the context of attacks against their deniability via Fiat-Shamir transformations. We address the following issue: How to design and implement a deniable (IS), that is secure against ephemeral leakage on both a Prover’s and a Verifier’s side, and withstands attacks based on Fiat-Shamir transformation. We propose a new security model to address the leakage on the Verifier’s side, extending the previous propositions [1]. During the Query Stage, we allow the malicious Verifier to set random values used on the Prover’s side. Additionally, we allow malicious Prover to access ephemeral values of the Verifier during the Impersonation Stage. We introduce two generic constructions based on three-step (IS). Finally, we provide an example scheme based on the extended construction from [1], which is provably deniable and secure in our new strong model.

Cite

CITATION STYLE

APA

Krzywiecki, Ł., & Słowik, M. (2017). Strongly Deniable Identification Schemes Immune to Prover’s and Verifier’s Ephemeral Leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10543 LNCS, pp. 115–128). Springer Verlag. https://doi.org/10.1007/978-3-319-69284-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free