121 Hits in 3.9 sec

Automated Cryptographic Analysis of the Pedersen Commitment Scheme [chapter]

Roberto Metere, Changyu Dong
2017 Lecture Notes in Computer Science  
This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its security properties of correctness, perfect hiding, and computational binding.  ...  Commitments are building blocks of many cryptographic constructions, for example, verifiable secret sharing, zero-knowledge proofs, and e-voting.  ...  Formal Verification of Pedersen Commitment Scheme In this section we show how we modelled the generic commitment scheme and its security properties, the Pedersen commitment scheme and we proved its security  ... 
doi:10.1007/978-3-319-65127-9_22 fatcat:lc2ro2rlzvd4jfmek2hdnu5grq

On the Formalisation of $$\varSigma $$ -Protocols and Commitment Schemes [chapter]

David Butler, David Aspinall, Adrià Gascón
2019 Research Series on the Chinese Dream and China's Development Path  
In this work we provide the first formal analysis in a proof assistant of such a relationship and in doing so formalise Σ-protocols and commitment schemes and provide proofs of security for well known  ...  There is a fundamental relationship between Σ-protocols and commitment schemes whereby the former can be used to construct the latter.  ...  On the Formalisation of Σ-Protocols and Commitment Schemes  ... 
doi:10.1007/978-3-030-17138-4_8 dblp:conf/post/ButlerAG19 fatcat:razflr2bbnd65amqwt5x3xfqqu

ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices [article]

Panagiotis Papadopoulos, Iñigo Querejeta-Azurmendi, Jiexin Zhang, Matteo Varvello, Antonio Nappa, Benjamin Livshits
2020 arXiv   pre-print
Recent studies show that 20.4% of the internet traffic originates from automated agents.  ...  To identify and block such ill-intentioned traffic, mechanisms that verify the humanness of the user are widely deployed across the internet. CAPTCHA is the most popular among such mechanisms.  ...  The Pedersen commitment scheme gives us the following property: V 1 +V 2 = Commit(v 1 ) + Commit(v 2 ) = Commit(v 1 + v 2 ).  ... 
arXiv:1911.07649v3 fatcat:uez57nwx4jah7gk5mx4kbrxa4m

Algebraic Construction for Zero-Knowledge Sets

Rui Xue, Ning-Hui Li, Jiang-Tao Li
2008 Journal of Computer Science and Technology  
That is, the schemes employ the Merkle tree as a basic structure and mercurial commitments as the commitment units to nodes of the tree. The proof for any query consists of an authentication chain.  ...  However all the existing ZKS schemes follow the basic structure by Micali et al.  ...  Micali, Rabin, and Kilian [1] give an efficient construction of zero-knowledge sets using the Merkle hash tree [2] and the Pedersen commitment scheme [3] .  ... 
doi:10.1007/s11390-008-9119-x fatcat:oouf3erpnrbotmztavahrd72ja

emmy – Trust-Enhancing Authentication Library

Miha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, Tilen Marc
2019 Zenodo  
Some privacy-enhancing digital credentials enable revealing only part of your identity and thus hiding all information that is not necessarily needed for the online service.  ...  People, organizations, devices need to make many kinds of claims as part of their everyday activities.  ...  Acknowledgements The research was supported, in part, by grants H2020-DS-2017-780108 (FEN-TEC) and H2020-ICT-2016-730929 (mF2C).  ... 
doi:10.5281/zenodo.3405858 fatcat:s5so6fn3ufhlnnwzipkksqspxu

A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup [chapter]

Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko
2008 Lecture Notes in Computer Science  
The pseudonyms are self-certified and computed by the users themselves from their cryptographic long-term identities. 2 is known under a different and unique pseudonym, and further there is no need of  ...  the continuous involvement of a Trusted Third Party (TTP).  ...  Acknowledgments This research was funded by the European Network of Excellence Future of Identity in the Information Society (FIDIS) and by the European Integrated Project for Privacy and Identity Management  ... 
doi:10.1007/978-3-540-79966-5_5 fatcat:k4q4eh772vap7gcj2rlxh73rc4

Practical Everlasting Privacy [chapter]

Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan
2013 Lecture Notes in Computer Science  
As an illustration, we show that several variants of Helios (including Helios with Pedersen commitments) and a protocol by Moran and Naor achieve practical everlasting privacy, using the ProVerif and the  ...  In particular, we model this for perfectly hiding and computationally binding primitives (or the converse), such as Pedersen commitments, and for symmetric and asymmetric encryption primitives.  ...  The research leading to these results has received funding from the European Research Council under the European Unions Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement no 258865, project  ... 
doi:10.1007/978-3-642-36830-1_2 fatcat:5chcpngfh5bstaexmg37swika4

Towards Anonymous, Unlinkable, and Confidential Transactions in Blockchain

Kalpana Singh, Nicolas Heulot, Elyes Ben Hamida
2018 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
We propose a novel security and privacy-preserving protocol for the blockchain that addresses the limitations of existing approaches, mainly the anonymity and unlinkability of users' identities and the  ...  In this paper, we investigate the issues of data and users' privacy in decentralized environments.  ...  ACKNOWLEDGMENT This research work has been carried out under the leadership of the Institute for Technological Research SystemX, and therefore granted with public funds within the scope of the French Program  ... 
doi:10.1109/cybermatics_2018.2018.00274 dblp:conf/ithings/SinghHH18 fatcat:lxv4xpeugvertc7jwqhzzoxmeq

SoK of Used Cryptography in Blockchain [article]

Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019 arXiv   pre-print
To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed  ...  We also include possible instantiations of these cryptographic concepts in the blockchain domain.  ...  There are many commitment schemes such as Pedersen commitment [155] and elliptic curve Pedersen commitment. Zerocoin [124] uses Pedersen commitment to bind a serial number s to Zerocoin z.  ... 
arXiv:1906.08609v3 fatcat:l62esrum3bhmfcdxzpx3h3he4e

A Formal Analysis of the Mimblewimble Cryptocurrency Protocol

Adrián Silveira, Gustavo Betarte, Maximiliano Cristiá, Carlos Luna
2021 Sensors  
of the relevant security properties of MW.  ...  We present and discuss those properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations.  ...  Commitment Scheme A commitment scheme [34] is a two-phase cryptographic protocol between two parties: a sender and a receiver.  ... 
doi:10.3390/s21175951 pmid:34502842 pmcid:PMC8434605 fatcat:qr2o673tnfa2ndujtay6rsw2ya

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head [article]

José Carlos Bacelar Almeida
2021 arXiv   pre-print
In this paper we give the first machine-checked implementation of this transformation.  ...  Using a recently developed code extraction mechanism for EasyCrypt we synthesize a formally verified implementation of the protocol, which we benchmark to get an indication of the overhead associated with  ...  secret sharing scheme, the BGW protocol [9] and the Pedersen commitment scheme.  ... 
arXiv:2104.05516v3 fatcat:uytuhvwdxratpel7fh3etledji

Policy-hiding access control in open environment

Jiangtao Li, Ninghui Li
2005 Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing - PODC '05  
The other technique is Committed-Integer-based Oblivious Transfer.  ...  In Trust Management and attribute-based access control systems, access control decisions are based on the attributes (rather than the identity) of the requester: Access is granted if Alice's attributes  ...  In Section 4, we review two cryptographic building blocks that we use, namely, the Pedersen commitment scheme and the scrambled circuit protocol for 2-SFE.  ... 
doi:10.1145/1073814.1073819 dblp:conf/podc/LiL05 fatcat:3p7celf2dng3bgp3cixqe5frxa

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems [chapter]

Juan E. Rubio, Cristina Alcaraz, Javier Lopez
2017 Lecture Notes in Computer Science  
However, it also has some privacy issues with respect to the privacy of the customers when analysing their consumption data.  ...  Both privacy and performance are essential for the rapid adoption of Smart Grid technologies.  ...  ACKNOWLEDGEMENTS The second author receives funding from the Ramón y Cajal research programme financed by the Ministerio de Economía y Competitividad.  ... 
doi:10.1007/978-3-319-71368-7_15 fatcat:t5zazzonnvannm53tostyilfwy

ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices

Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Matteo Varvello, Antonio Nappa, Jiexin Zhang, Benjamin Livshits
2021 Proceedings on Privacy Enhancing Technologies  
Recent studies show that 20.4% of the internet traffic originates from automated agents.  ...  To ensure the integrity of the process, the classification result is enclosed in a zero-knowledge proof of humanness that can be safely shared with a remote server.  ...  Acknowledgments We would like to thank our shepherd, Fan Zhang, and the anonymous reviewers for their suggestions to improve the paper.  ... 
doi:10.2478/popets-2021-0058 fatcat:ah2qlsv5pjcxhh4dxqfqghsrfy

A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof

Honglei Li, Weilian Xue, Leandros Maglaras
2021 Security and Communication Networks  
Based on the blockchain technology, we proposed a sealed-bid e-auction scheme with smart contract technology, Bulletproofs zero-knowledge proof protocols, and Pedersen commitment algorithm.  ...  The proposed scheme constructed an auction mechanism without the third-party auctioneer so as to restrict the behaviors of auction parties for the sake of auction security, reliability, fairness, and privacy  ...  of China, under Grant no. 62072221.  ... 
doi:10.1155/2021/5523394 fatcat:6jqdbrszwfbs7haoyqskjqwipq
« Previous Showing results 1 — 15 out of 121 results