Speaker: Mira Belenkiy , Brown University
Date: December 7 2007
Time: 10:30AM to 12:00PM
Contact: Be Blackburn, 3-6098, firstname.lastname@example.org
We give the first construction of a practical non-interactive anonymous credential system whose security does not rely on the random oracle model. We introduce P-signatures (Signatures with efficient Protocols) as our main building block. A P-signature scheme consists of a signature scheme, a commitment scheme, and
(1) an interactive protocol for obtaining a signature on a committed value;
(2) a non-interactive proof system for proving that the contents of a commitment has been signed;
(3) a non-interactive proof system for proving that a pair of commitments are commitments to the same value. P-signatures are a powerful tool that may serve as a useful building block for other privacy-preserving authentication mechanisms.
Our constructions makes extensive use of the recently developed Groth-Sahai proof system. We present some new notation that makes it easier to use Groth-Sahai proofs as a building block, which may be of independent interest.
See other events that are part of Cryptography and Information Security Seminars 2007/2008
See other events happening in December 2007