Efficient Implementation of a Post-Quantum Anonymous Credential Protocol

被引:1
|
作者
Blazy, Olivier
Chevalier, Celine
Renaut, Guillaume
Ricosset, Thomas
Sageloli, Eric
Senet, Hugo
机构
基金
欧盟地平线“2020”;
关键词
anonymous credentials; post-quantum cryptography; lattice-based cryptography; group signatures; effcient implementation; SIGNATURES;
D O I
10.1145/3600160.3600188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication on the Internet usually has the drawback of leaking the identity of the users, or at least allowing to trace them from a server to another. Anonymous credentials overcome this issue, by allowing users to reveal the attributes necessary for the authentication, without revealing any other information (in particular not their identity). In this article, we provide a generic framework to construct anonymous credential schemes and use it to give a concrete construction of post-quantum (lattice-based) anonymous credential protocol. Our protocol thus allows for long-term security even when one considers the emergence of quantum computers able to break widely used traditional computational assumptions, such as RSA, the discrete logarithm or Diffe-Hellman. We also give a concrete implementation of our protocol, which is only one order of magnitude slower and bandwidth consuming than previous anonymous credentials that are not post-quantum.
引用
收藏
页数:32
相关论文
共 50 条
  • [41] Post-quantum relativity
    Rossler, OE
    Weibel, P
    CHAOS SOLITONS & FRACTALS, 2001, 12 (09) : 1573 - 1576
  • [42] cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope
    Gao, Yiwen
    Xu, Jia
    Wang, Hongbing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (03) : 551 - 568
  • [43] Efficient Post-Quantum Secure Deterministic ThresholdWallets from Isogenies
    Das, Poulami
    Erwig, Andreas
    Meyer, Michael
    Struck, Patrick
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 522 - 532
  • [44] Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT
    Xu, Shiyuan
    Chen, Xue
    Guo, Yu
    Yiu, Siu-Ming
    Gao, Shang
    Xiao, Bin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1119 - 1134
  • [45] LegRoast: Efficient Post-quantum Signatures from the Legendre PRF
    Beullens, Ward
    Delpech de Saint Guilhem, Cyprien
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 130 - 150
  • [46] Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy
    Boschini, Cecilia
    Camenisch, Jan
    Ovsiankin, Max
    Spooner, Nicholas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 247 - 267
  • [47] MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
    Adj G.
    Barbero S.
    Bellini E.
    Esser A.
    Rivera-Zamarripa L.
    Sanna C.
    Verbel J.
    Zweydinger F.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 304 - 328
  • [48] Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography
    Ravi, Prasanna
    Sundar, Vijaya Kumar
    Chattopadhyay, Anupam
    Bhasin, Shivam
    Easwaran, Arvind
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [49] A post-quantum key exchange protocol from the intersection of quadric surfaces
    Daniele Di Tullio
    Manoj Gyawali
    The Journal of Supercomputing, 2023, 79 : 16529 - 16558
  • [50] Post-quantum protocol for computing set intersection cardinality with linear complexity
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Choudhury, Tanmay
    Kundu, Nibedita
    IET INFORMATION SECURITY, 2020, 14 (06) : 661 - 669