Batch Groth-Sahai
BLAZY, Olivier
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
FUCHSBAUER, Georg
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
Voir plus >
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
BLAZY, Olivier
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
FUCHSBAUER, Georg
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
VERGNAUD, Damien
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
< Réduire
Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
Laboratoire d'informatique de l'école normale supérieure [LIENS]
Langue
en
Communication dans un congrès
Ce document a été publié dans
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, 2010-06-22, Beijing. 2010-03-16, vol. 6123, p. 218-235
Springer
Résumé en anglais
In 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zero-knowledge (and witness-indistinguishable) proofs in bilinear groups. While avoiding expensive NP-reductions, these proof systems ...Lire la suite >
In 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zero-knowledge (and witness-indistinguishable) proofs in bilinear groups. While avoiding expensive NP-reductions, these proof systems are still inefficient due to a number of pairing computations required for verification. We apply recent techniques of batch verification to the Groth-Sahai proof systems and manage to improve significantly the complexity of proof verification. We give explicit batch verification formulas for generic Groth-Sahai equations (whose cost is less than a tenth of the original) and also for specific popular protocols relying on their methodology (namely Groth's group signatures and Belenkiy-Chase-Kohlweiss-Lysyanskaya's P-signatures).< Réduire
Mots clés en anglais
Pairing-based cryptography
Batch veri cation
Groth-Sahai proof system
Projet Européen
European Network of Excellence in Cryptology - Phase II
Project ANR
Pairings and Advances in Cryptology for E-cash - ANR-07-TCOM-0013
Origine
Importé de halUnités de recherche