Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal.

Slides:



Advertisements
Similar presentations
Wonders of the Digital Envelope
Advertisements

On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Lecture 15 Zero-Knowledge Techniques. Peggy: “I know the password to the Federal Reserve System computer, the ingredients in McDonald’s secret sauce,
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Short course on quantum computing Andris Ambainis University of Latvia.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Zero-Knowledge.
Zero-Knowledge Proofs J.W. Pope M.S. – Mathematics May 2004.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
1 Adapted from Oded Goldreich’s course lecture notes.
Oblivious Transfer based on the McEliece Assumptions
Zero-Knowledge Proofs And Their Applications in Cryptographic Systems Sultan Almuhammadi ICS 454.
Digital Envelopes, Zero Knowledge, and other wonders of modern cryptography (How computational complexity enables digital security & privacy) Guy Rothblum.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
Zero-Knowledge Proofs And Their Applications in Cryptographic Systems ICS 555 Cryptography and Data Security Sultan Almuhammadi.
PRESENTED BY CHRIS ANDERSON JULY 29, 2009 Using Zero Knowledge Proofs to Validate Electronic Votes.
Lecture 6: Public Key Cryptography
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
CSCI 3130: Formal languages and automata theory Andrej Bogdanov The Chinese University of Hong Kong Interaction,
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Wonders of the Digital Envelope Avi Wigderson Institute for Advanced Study.
1 SC700 A2 Internet Information Protocols 3/20/2001 Paper Presentation by J. Chu How to Explain Zero-Knowledge Protocols to Your Children.
11 Identification & ZKIP.  Introduction  Passwords  Challenge-Response  ZKIP 22.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Topic 23: Zero-Knowledge Proof and Cryptographic Commitment
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Introduction to Information Security Lecture 6: Other Cryptographic Primitives
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Zero-Knowledge Proofs And Their Applications in Cryptographic Systems ICS 555 Cryptography and Data Security Sultan Almuhammadi.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
The Paillier Cryptosystem
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
11 Identification & ZKIP.  Introduction  Passwords  Challenge-Response  ZKIP 22.
Identification & ZKIP.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
CSC 3130: Automata theory and formal languages Andrej Bogdanov The Chinese University of Hong Kong Interaction,
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Multi-Party Proofs and Computation Based in part on materials from Cornell class CS 4830.
Zero Knowledge Proofs Matthew Pouliotte Anthony Pringle Cryptography November 22, 2005 “A proof is whatever convinces me.” -~ Shimon Even.
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
Cryptography CS Lecture 19 Prof. Amit Sahai.
July 8, 2004 IEEE - CEC '041 Better Privacy and Security in E-Commerce: Using Elliptic Curve-Based Zero-Knowledge Proofs Sultan Almuhammadi Nien Sui Dennis.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Zero-Knowledge Proofs Ben Hosp. Classical Proofs A proof is an argument for the truth or correctness of an assertion. A classical proof is an unambiguous.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
Feige-Fiat-Shamir Zero Knowledge Proof Based on difficulty of computing square roots mod a composite n Given two large primes p, q and n=p * q, computing.
IP, (NON)ISOGRAPH and Zero Knowledge Protocol COSC 6111 Advanced Algorithm Design and Analysis Daniel Stübig.
CRYPTOGRAPHY COT 6410 AWRAD MOHAMMED ALI NESLISAH TOROSDAGLI JOSIAH WONG.
Topic 36: Zero-Knowledge Proofs
Zero Knowledge Anupam Datta CMU Fall 2017
Cryptographic Protocols
Zero-Knowledge Proofs
Cryptographic Protocols
09 Zero Knowledge Proof Hi All, One more topic to go!
Zero-Knowledge Proofs
Presentation transcript:

Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal

Zero Knowledge Proofs Introduction Properties of ZKP Advantages of ZKP Examples Fiat-Shamir Identification Protocol Real-Time Applications

Zero Knowledge Proofs(ZKP) Goldwasser, Micali, and Rackoff, ZKP instance of Interactive Proof System Interactive Proof Systems –Challenge-Response Authentication –Prover and Verifier –Verifier Accepts or Rejects the Prover

ZKP Zero knowledge Transfer between the Prover and the Verifier The verifier accepts or rejects the proof after multiple challenges and responses Probabilistic Proof Protocol Overcomes Problems with Password Based Authentication

Properties of ZKP Completeness –Succeeds with high probability for a true assertion given an honest verifier and an honest prover. Soundness –Fails for any other false assertion, given a dishonest prover and an honest verifier

Advantages of ZKP As name Suggests – Zero Knowledge Transfer Computational Efficiency – No Encryption No Degradation of the protocol Based on problems like discrete logarithms and integer factorization

Classic Example Ali Baba’s Cave Alice has to convince Bob She knows the secret to open the cave door without telling the secret (“Open Sesame”). (source:

Fiat-Shamir Identification Protocol 3 Message Protocol Alice A, the Prover and Bob B, the Verifier A  B: x = r 2 mod n A  B: e  { 0,1} A  B: y = r * s e mod n is y 2 = x * v e ? A random modulus n, product of two large prime numbers p and q generated by a trusted party and made public Prover chooses secret s relatively prime to n prover computes v = s 2 mod n, where v is the public key

Fiat-Shamir Identification Protocol Alice chooses a random number r (1  r  n-1) Sends to Bob x = r 2 mod n – commitment Bob randomly sends either a 0 or a 1 ( e  { 0,1}) as his challenge Depending on the challenge from Bob, Alice computes the response as y = r if e = 0 or otherwise y = r*s mod n Bob accepts the response upon checking y 2  x * v e mod n

After many iterations, with a very high probability Bob can verify Alice’s identity Alice’s response does not reveal the secret s (with y = r or y = r* s mod n) An intruder can prove Alice’s identity without knowing the secret, if he knows Bob’s challenge in advance: –Generate random r –If expected challenge is 1, send x = r 2 /v mod n as commitment, and y = r as response –If expected challenge is 0, send x = r mod n as commitment Probability that any Intruder impersonating the prover can send the right response is only ½ Probability reduced as iterations are increased Important - Alice should not repeat r Fiat-Shamir Identification Protocol

Applications Watermark Verification –Show the presence of watermark without revealing information about it –prevents from removing the watermark and reselling multiple duplicate copies Others – e-voting, e-cash etc.

Products Sky’s VideoCrypt –Analogue decoding card for satellite DirecTV descrambler used to authenticate the subscriber’s card –Uses Fiat-Shamir Zero Knowledge Protocol NGSCB – New Generation Secure Computing Base –Zero Knowledge for code attestations

References [1] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography. [2] Ross Anderson, Security Engineering [3] Wenbo Mao, Modern Cryptography theory and practice [4] Don Coppersmith (Ed.), Advances in Cryptology- CRYPTO ’ 95 Lecture Notes in Computer Science. [5] [6] Oded Goldreich, Silvio Micali and Avi Wigderson, “ Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”. [7] Oren, Y., “ Properties of Zero-knowledge Proofs”. [8] A Mitropoulos, and H. Meijer, “ Zero-knowledge proofs – a survey”.