Zero-knowledge proofs of possession of digital signatures and its applications

Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

5 Citations (Scopus)

Abstract

Demonstrating in zero-knowledge the possession of digital signatures has many cryptographic applications such as anonymous authentication, identity escrow, publicly verifiable secret sharing and group signature. This paper presents a general construction of zero-knowledge proof of possession of digital signatures. An implementation is shown for discrete logarithm settings. It includes protocols of proving exponentiation and modulo operators, which are the most interesting operators in digital signatures. The proposed construction is applicable for ElGamal signature scheme and its variations. The construction also works for the RSA signature scheme. In discrete logarithm settings, our technique is O(l) times more efficient than previously known methods.

Original languageEnglish
Title of host publicationInformation and Communication Security
Subtitle of host publicationSecond International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings
EditorsVijay Varadharajan, Yi Mu
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages103-118
Number of pages16
Volume1726
ISBN (Electronic)9783540479420
ISBN (Print)9783540666820
DOIs
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Conference on Information and Communication Security, ICICS - 1999 - Sydney, Australia
Duration: 9 Nov 199911 Nov 1999

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume1726
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information and Communication Security, ICICS - 1999
Country/TerritoryAustralia
CitySydney
Period9/11/9911/11/99

Fingerprint

Dive into the research topics of 'Zero-knowledge proofs of possession of digital signatures and its applications'. Together they form a unique fingerprint.

Cite this