DOI: 10.1007/3-540-39118-5_13
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations

Abstract: Abstract:A new protocol is presented that allows A to convince B that she knows a solution to the Discrete Log Problem-i.e. that she knows an x such that dc E /3 (mod N ) holdswithout revealing anydung about x to B. Protocols are given both for N prime and for N composite.show possession of: -We also give protocols for extensions of the Discrete Log problem allowing A to multiple discrete logarithms to the same base at the same time, i.e. knowing several discrete logarithms to different bases at the same time,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 168 publications
(103 citation statements)
references
References 9 publications
(3 reference statements)
0
103
0
Order By: Relevance
“…This protocol is derived from proofs of equality of two discrete logarithms from [6,12,1], combined with a proof of knowledge of a discrete logarithm modulo n [16]. , r 2 )).…”
Section: Proof That Two Commitments Hide the Same Secretmentioning
confidence: 99%
“…This protocol is derived from proofs of equality of two discrete logarithms from [6,12,1], combined with a proof of knowledge of a discrete logarithm modulo n [16]. , r 2 )).…”
Section: Proof That Two Commitments Hide the Same Secretmentioning
confidence: 99%
“…The construction combines the qTMC scheme of section 3 with a programmable hash function H G : T → G and techniques that were introduced in [3]. Programmable hash functions, as formalized by Hofheinz and Kiltz [17], are designed in such a way that a trapdoor information makes it possible to relate the output H G (M ), which lies in a group The number theoretic hash function used in [11,25] is an example of such a (1, )-programmable hash function, for some polynomial . …”
Section: Definition 2 [15] a Zk-edb Protocol Is Strongly Independentmentioning
confidence: 99%
“…The proposed protocol is efficient because each step can be completed in one round. During the registration step, as shown in Figure 1, by providing y 1 (which is used for achieving anonymity), B convinces RC of possession of x B1 via a zero-knowledge proof [6]. We omit the copyright violator identification step as it is straightforward and irrelevant to our attacks and discussions in this paper.…”
Section: − −−−−−−−−−−−−−−−−−−−−−−−−−−− →mentioning
confidence: 99%