Efficient Implementation of a Post-Quantum Anonymous Credential Protocol

被引:1
|
作者
Blazy, Olivier
Chevalier, Celine
Renaut, Guillaume
Ricosset, Thomas
Sageloli, Eric
Senet, Hugo
机构
基金
欧盟地平线“2020”;
关键词
anonymous credentials; post-quantum cryptography; lattice-based cryptography; group signatures; effcient implementation; SIGNATURES;
D O I
10.1145/3600160.3600188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication on the Internet usually has the drawback of leaking the identity of the users, or at least allowing to trace them from a server to another. Anonymous credentials overcome this issue, by allowing users to reveal the attributes necessary for the authentication, without revealing any other information (in particular not their identity). In this article, we provide a generic framework to construct anonymous credential schemes and use it to give a concrete construction of post-quantum (lattice-based) anonymous credential protocol. Our protocol thus allows for long-term security even when one considers the emergence of quantum computers able to break widely used traditional computational assumptions, such as RSA, the discrete logarithm or Diffe-Hellman. We also give a concrete implementation of our protocol, which is only one order of magnitude slower and bandwidth consuming than previous anonymous credentials that are not post-quantum.
引用
收藏
页数:32
相关论文
共 50 条
  • [1] Blocklistable Anonymous Credential for Circuits with Post-quantum Security
    Yu, Zuoxia
    Yang, Rupeng
    Susilo, Willy
    Au, Man Ho
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT II, 2025, 14904 : 83 - 105
  • [2] Anonymous Post-Quantum Cryptocash
    Zhang, Huang
    Zhang, Fangguo
    Tian, Haibo
    Au, Man Ho
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 461 - 479
  • [3] Post-quantum signature schemes for efficient hardware implementation
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Moldovyan, Nikolay A.
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [4] Efficient post-quantum private set-intersection protocol
    Debnath, Sumit Kumar
    Kundu, Nibedita
    Choudhury, Tanmay
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (3-4) : 405 - 423
  • [5] MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
    Esgin, Muhammed F.
    Zhao, Raymond K.
    Steinfeld, Ron
    Liu, Joseph K.
    Liu, Dongxi
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 567 - 584
  • [6] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13277 LNCS : 402 - 432
  • [7] An efficient anonymous credential system
    Akagi, Norio
    Manabe, Yoshifumi
    Okamoto, Tatsuaki
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 272 - 286
  • [8] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432
  • [9] QUIC Protocol with Post-quantum Authentication
    Raavi, Manohar
    Wuthier, Simeon
    Chandramouli, Pranav
    Zhou, Xiaobo
    Chang, Sang-Yoon
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 84 - 91
  • [10] Efficient and reliable post-quantum authentication
    D'Arco, Paolo
    De Prisco, Roberto
    Pozo, Angel Perez del
    THEORETICAL COMPUTER SCIENCE, 2024, 1003