TY - GEN
T1 - Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs
AU - Begum, Nasima
AU - Nakanishi, Toru
AU - Funabiki, Nobuo
PY - 2013/12/1
Y1 - 2013/12/1
N2 - To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously convince a verifier of the possession of a certificate issued by the issuing authority. In this system, a user can prove relations on his/her attributes embedded into the certificate. Previously, we have proposed an anonymous credential system with constant-size proofs and faster proof generations for CNF formulas than the existing system. In the system, in the verification, some value should be included in some set Φ. Unfortunately, this system has a problem of requiring long public parameters that is proportional to the size of the set Φ. In this paper, we propose an extension to reduce the public key by separating this set Φ into two sets Φ1 and Φ2 with logarithmic sizes such that u1 Φ1 and u2 Φ2 if and only if u1 +u2 Φ. Furthermore, we evaluate the efficiency based on the implementation.
AB - To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously convince a verifier of the possession of a certificate issued by the issuing authority. In this system, a user can prove relations on his/her attributes embedded into the certificate. Previously, we have proposed an anonymous credential system with constant-size proofs and faster proof generations for CNF formulas than the existing system. In the system, in the verification, some value should be included in some set Φ. Unfortunately, this system has a problem of requiring long public parameters that is proportional to the size of the set Φ. In this paper, we propose an extension to reduce the public key by separating this set Φ into two sets Φ1 and Φ2 with logarithmic sizes such that u1 Φ1 and u2 Φ2 if and only if u1 +u2 Φ. Furthermore, we evaluate the efficiency based on the implementation.
UR - http://www.scopus.com/inward/record.url?scp=84892638394&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84892638394&partnerID=8YFLogxK
U2 - 10.1109/GCCE.2013.6664912
DO - 10.1109/GCCE.2013.6664912
M3 - Conference contribution
AN - SCOPUS:84892638394
SN - 9781479908929
T3 - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013
SP - 530
EP - 533
BT - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013
T2 - 2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013
Y2 - 1 October 2013 through 4 October 2013
ER -