Efficient Implementation of a Post-Quantum Anonymous Credential Protocol

被引:1
|
作者
Blazy, Olivier
Chevalier, Celine
Renaut, Guillaume
Ricosset, Thomas
Sageloli, Eric
Senet, Hugo
机构
基金
欧盟地平线“2020”;
关键词
anonymous credentials; post-quantum cryptography; lattice-based cryptography; group signatures; effcient implementation; SIGNATURES;
D O I
10.1145/3600160.3600188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication on the Internet usually has the drawback of leaking the identity of the users, or at least allowing to trace them from a server to another. Anonymous credentials overcome this issue, by allowing users to reveal the attributes necessary for the authentication, without revealing any other information (in particular not their identity). In this article, we provide a generic framework to construct anonymous credential schemes and use it to give a concrete construction of post-quantum (lattice-based) anonymous credential protocol. Our protocol thus allows for long-term security even when one considers the emergence of quantum computers able to break widely used traditional computational assumptions, such as RSA, the discrete logarithm or Diffe-Hellman. We also give a concrete implementation of our protocol, which is only one order of magnitude slower and bandwidth consuming than previous anonymous credentials that are not post-quantum.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] Efficient GPU Implementations of Post-Quantum Signature XMSS
    Wang, Ziheng
    Dong, Xiaoshe
    Chen, Heng
    Kang, Yan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (03) : 938 - 954
  • [22] An Efficient Post-quantum Identity-Based Signature
    Zhichao, Yang
    Duong, Dung H.
    Susilo, Willy
    Guomin, Yang
    Chao, Li
    Rongmao, Chen
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 238 - 248
  • [23] Efficient post-quantum secure deterministic wallet scheme
    Hu, Mingxing
    Liu, Zhen
    Zhou, Yunhong
    CYBERSECURITY, 2024, 7 (01):
  • [24] Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS
    Sun, Shuzhou
    Zhang, Rui
    Ma, Hui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) : 2542 - 2555
  • [25] A new post-quantum voting protocol based on physical laws
    Zeyu Sun
    Wenhua Gao
    Hua Dong
    Huiqin Xie
    Li Yang
    Quantum Information Processing, 21
  • [26] A new post-quantum voting protocol based on physical laws
    Sun, Zeyu
    Gao, Wenhua
    Dong, Hua
    Xie, Huiqin
    Yang, Li
    QUANTUM INFORMATION PROCESSING, 2022, 21 (08)
  • [27] A post-quantum key exchange protocol from the intersection of conics
    Alzati, Alberto
    Di Tullio, Daniele
    Gyawali, Manoj
    Tortora, Alfonso
    JOURNAL OF SYMBOLIC COMPUTATION, 2025, 126
  • [28] Evaluating NTT/INTT Implementation Styles for Post-Quantum Cryptography
    Imran, Malik
    Khan, Safiullah
    Khalid, Ayesha
    Rafferty, Ciara
    Shah, Yasir Ali
    Pagliarini, Samuel
    Rashid, Muhammad
    O'Neill, Maire
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 485 - 488
  • [29] New Approach to the Implementation of Post-Quantum Digital Signature Scheme
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Babenko, Vitalina
    Perevozova, Iryna
    Chepurko, Iryna
    Smirnov, Oleksii
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 166 - 171
  • [30] Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
    Fitzgibbon, Gregory
    Ottaviani, Carlo
    CRYPTOGRAPHY, 2024, 8 (02)