Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage

In this paper, we consider Identification Schemes ( $$\mathsf {IS}$$ ) in the context of attacks against their deniability via Fiat-Shamir transformations. We address the following issue: How to design and implement a deniable $$\mathsf {IS}$$ , that is secure against ephemeral leakage on both a Pro...

Full description

Saved in:
Bibliographic Details
Published inInnovative Security Solutions for Information Technology and Communications Vol. 10543; pp. 115 - 128
Main Authors Krzywiecki, Łukasz, Słowik, Marcin
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2017
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319692836
9783319692838
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-69284-5_9

Cover

More Information
Summary:In this paper, we consider Identification Schemes ( $$\mathsf {IS}$$ ) in the context of attacks against their deniability via Fiat-Shamir transformations. We address the following issue: How to design and implement a deniable $$\mathsf {IS}$$ , that is secure against ephemeral leakage on both a Prover’s and a Verifier’s side, and withstands attacks based on Fiat-Shamir transformation. We propose a new security model to address the leakage on the Verifier’s side, extending the previous propositions [1]. During the Query Stage, we allow the malicious Verifier to set random values used on the Prover’s side. Additionally, we allow malicious Prover to access ephemeral values of the Verifier during the Impersonation Stage. We introduce two generic constructions based on three-step $$\mathsf {IS}$$ . Finally, we provide an example scheme based on the extended construction from [1], which is provably deniable and secure in our new strong model.
Bibliography:Partially supported by funding from Polish National Science Centre (NCN) contract number DEC-2013/08/M/ST6/00928.
Original Abstract: In this paper, we consider Identification Schemes (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {IS}$$\end{document}) in the context of attacks against their deniability via Fiat-Shamir transformations. We address the following issue: How to design and implement a deniable \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {IS}$$\end{document}, that is secure against ephemeral leakage on both a Prover’s and a Verifier’s side, and withstands attacks based on Fiat-Shamir transformation. We propose a new security model to address the leakage on the Verifier’s side, extending the previous propositions [1]. During the Query Stage, we allow the malicious Verifier to set random values used on the Prover’s side. Additionally, we allow malicious Prover to access ephemeral values of the Verifier during the Impersonation Stage. We introduce two generic constructions based on three-step \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {IS}$$\end{document}. Finally, we provide an example scheme based on the extended construction from [1], which is provably deniable and secure in our new strong model.
ISBN:3319692836
9783319692838
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-319-69284-5_9