Skip to main content

Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11527))

  • 1297 Accesses

Abstract

We present anonymous identification schemes, where a verifier can check that the user belongs to an ad-hoc group of users (just like in case of ring signatures), however a transcript of a session executed between a user and a verifier is deniable: neither the verifier nor the prover can convice a third party that a given user has been involved in a session but also he cannot prove that any user has been interacting with the verifier. Our realization of this idea is based on Schnorr identification scheme and ring signatures. We present two constructions, a simple 1-of-n case and a more advanced k-of-n, where the prover must use at least k private keys. They are immune to leakage of ephemeral keys and with minor modifications this property can be sacrificed for a simpler construction.

This research was initially supported by Polish National Science Centre under grant OPUS no 2014/15/B/ST6/02837 and further funded by Wroclaw University of Technology grant S50129/K1102.

Full version of the paper is available in the IACR Cryptology ePrint Archive [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 53.49
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 69.62
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Krzywiecki, Ł., Kutyłowski, M., Pezda, J., Słowik, M.: Anonymous deniable identification in ephemeral setup & leakage scenarios. Cryptology ePrint Archive, Report 2019/337 (2019). https://eprint.iacr.org/

  2. Krzywiecki, Ł., Słowik, M.: Strongly deniable identification schemes immune to prover’s and verifier’s ephemeral leakage. In: Farshim, P., Simion, E. (eds.) SecITC 2017. LNCS, vol. 10543, pp. 115–128. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69284-5_9

    Chapter  Google Scholar 

  3. Naor, M.: Deniable ring authentication. In: Yung, M. (ed.) Annual International Cryptology–CRYPTO 2002 CRYPTO 2002. LNCS, vol. 2442, pp. 481–498. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45708-9_31

    Chapter  Google Scholar 

  4. Stinson, D.R., Wu, J.: An efficient and secure two-flow zero-knowledge identification protocol. Cryptology ePrint Archive, Report 2006/337 (2006)

    Google Scholar 

  5. Raimondo, M.D., Gennaro, R.: New approaches for deniable authentication. J. Cryptology 22(4), 572–615 (2009)

    Article  MathSciNet  Google Scholar 

  6. Krzywiecki, Ł.: Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. In: Bica, I., Reyhanitabar, R. (eds.) SECITC 2016. LNCS, vol. 10006, pp. 137–148. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47238-6_10

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Łukasz Krzywiecki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krzywiecki, Ł., Kutyłowski, M., Pezda, J., Słowik, M. (2019). Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20951-3_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20950-6

  • Online ISBN: 978-3-030-20951-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics