An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
スポンサーリンク
概要
- 論文の詳細を見る
We present a new methodology for constructing an efficient identification scheme, and based on it, we propose a lightweight identification scheme whose computational and storage costs are sufficiently low even for cheap devices such as RFID tags. First, we point out that the efficiency of a scheme with statistical zero-knowledgeness can be significantly improved by enhancing its zero-knowledgeness to perfect zero-knowledge. Then, we apply this technique to the Girault-Poupard-Stern (GPS) scheme which has been standardized by ISO/IEC. The resulting scheme shows a perfect balance between communication cost, storage cost, and circuit size (computational cost), which are crucial factors for implementation on RFID tags. Compared to GPS, the communication and storage costs are reduced, while the computational cost is kept sufficiently low so that it is implementable on a circuit nearly as small as GPS. Under standard parameters, the provers response is shortened 80 bits from 275 bits to 195 bits and in application using coupons, storage for one coupon is also reduced 80 bits, whereas the circuit size is estimated to be larger by only 335 gates. Hence, we believe that the new scheme is a perfect solution for fast authentication of RFID tags.
- 2011-01-01
著者
-
SANTOSO Bagus
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
OHTA Kazuo
Dept. of Informatics, The University of Electro-Communications
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Hanaoka Goichiro
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Sakiyama Kazuo
Dept. Of Informatics The University Of Electro-communications
-
Santoso Bagus
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Santoso Bagus
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Ohta Kazuo
Dept. Of Informatics The University Of Electro-communications
関連論文
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Unconditionally Secure Chaffing-and-Winnowing
- Factorization of Square-Free Integers with High Bits Known
- A New 'On the Fly' Identification Scheme : An Asymptoticity Trade-Off between ZK and Correctness
- The MAC-based Construction of Strong Multiple Encryption
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Invisibly Sanitizable Digital Signature Scheme
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Efficient Provider Authentication for Bidirectional Broadcasting Service
- A Trade-off Traitor Tracing Scheme
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes