ZKp based identification protocol on conic curve in distributed environment

This paper proposed a protocol for zero-knowledge proof of identity based on ElGamal on conic. It is more appropriate than the traditional identity protocol in distributed environment without trusted third parties. The security of this protocol relies on the discrete logarithm problem on conic over finite fields. Compared with those identification protocols implemented on elliptic curve, this protocol can be designed and implemented easier. And compared with that security lies on disassemble a large number, it runs faster. Corresponding to the simple version, a parallel version is presented subsequently. The characteristic of ZKp and security of the simple version is proved. The "soundness", "completeness", and amount of computation are also analyzed. A simple solution considering t/sub timeout/ is proposed to prevent a potential leak of our protocol.

[1]  Joo-Seok Song,et al.  Knowledge-proof based versatile smart card verification protocol , 2000, CCRV.

[2]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[3]  J. Vandewalle,et al.  Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1990 .

[4]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[5]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[6]  Yvo Desmedt,et al.  A General Zero-Knowledge Scheme , 1997, Des. Codes Cryptogr..

[7]  Toshiaki Tanaka,et al.  On the Existence of 3-Round Zero-Knowledge Protocols , 1998, CRYPTO.

[8]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[9]  Hugo Krawczyk,et al.  On the Composition of Zero-Knowledge Proof Systems , 1990, ICALP.

[10]  Yvo Desmedt,et al.  Abuses in Cryptography and How to Fight Them , 1988, CRYPTO.

[11]  Cao Zhenfu Conic analog of RSA cryptosystem and someimproved RSA cryptosystems , 1999 .

[12]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[13]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[14]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[15]  Thomas Beth,et al.  Efficient Zero-Knowledge Identification Scheme for Smart Cards , 1988, EUROCRYPT.