TY - GEN

T1 - Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs

AU - Begum, Nasima

AU - Nakanishi, Toru

AU - Funabiki, Nobuo

PY - 2013/12/1

Y1 - 2013/12/1

N2 - To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously convince a verifier of the possession of a certificate issued by the issuing authority. In this system, a user can prove relations on his/her attributes embedded into the certificate. Previously, we have proposed an anonymous credential system with constant-size proofs and faster proof generations for CNF formulas than the existing system. In the system, in the verification, some value should be included in some set Φ. Unfortunately, this system has a problem of requiring long public parameters that is proportional to the size of the set Φ. In this paper, we propose an extension to reduce the public key by separating this set Φ into two sets Φ1 and Φ2 with logarithmic sizes such that u1 Φ1 and u2 Φ2 if and only if u1 +u2 Φ. Furthermore, we evaluate the efficiency based on the implementation.

AB - To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously convince a verifier of the possession of a certificate issued by the issuing authority. In this system, a user can prove relations on his/her attributes embedded into the certificate. Previously, we have proposed an anonymous credential system with constant-size proofs and faster proof generations for CNF formulas than the existing system. In the system, in the verification, some value should be included in some set Φ. Unfortunately, this system has a problem of requiring long public parameters that is proportional to the size of the set Φ. In this paper, we propose an extension to reduce the public key by separating this set Φ into two sets Φ1 and Φ2 with logarithmic sizes such that u1 Φ1 and u2 Φ2 if and only if u1 +u2 Φ. Furthermore, we evaluate the efficiency based on the implementation.

UR - http://www.scopus.com/inward/record.url?scp=84892638394&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84892638394&partnerID=8YFLogxK

U2 - 10.1109/GCCE.2013.6664912

DO - 10.1109/GCCE.2013.6664912

M3 - Conference contribution

AN - SCOPUS:84892638394

SN - 9781479908929

T3 - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013

SP - 530

EP - 533

BT - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013

T2 - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013

Y2 - 1 October 2013 through 4 October 2013

ER -