140 likes | 342 Views
Zero Knowledge Protocol. By Mike Breeden. Basic Principle. Peggy (prover) needs to prove to Victor (verifier) that she can go through the door without telling him how she does it. Properties of Zero Knowledge. Peggy cannot cheat Victor Victor cannot cheat Peggy
E N D
Zero Knowledge Protocol By Mike Breeden
Basic Principle • Peggy (prover) needs to prove to Victor (verifier) that she can go through the door without telling him how she does it.
Properties of Zero Knowledge • Peggy cannot cheat Victor • Victor cannot cheat Peggy • Victor doesn’t learn anything from the protocol
Different Modes • Interactive • Parallel • Off-line
Technique based on primes • n = pq • Let y be a square mod n; x2≡ y (mod n) gcd(y, n) = 1 • Claim: Peggy claims to know square root s of y; s ≡ sqrt(1/y) (mod n)
(continued) • Peggy chooses one random numbers r1 with gcd(r1, n) = 1 and another random number r2≡ sr1-1 • Computes x1 ≡ r12 and x2 ≡ r22 (mod n) • Send x1 and x2 to Victor
(continued) • Victor checks that x1x2≡ y (mod n), then chooses x1 or x2 and asks Peggy to supply a square root of it and verifies its correctness. • These steps are repeated until Victor is satisfied.
Feige-Fiat-Shamir Identification Scheme • Peggy has secret numbers s1,…,sk. gcd(si,n) = 1 • vi≡ si-2 (mod n). vi are sent to Victor
Feige-Fiat-Shamir Procedure • Peggy chooses random integer r, x ≡ r2 (mod n). x is sent to Victor. • Victor chooses b1, …, bk with bi є {0,1} and send them to Peggy • Peggy computes y ≡rs1b1s2b2…skbk (mod n) and send y to Victor • Victor verifies x ≡ y2v1b1v2b2…vkbk (mod n) • Steps are repeated several times with different r
Attacks on Zero Knowledge • Man-in-the-middle: • Chess Grandmaster Problem • Mafia Fraud
References • Aronsson Hannu A. Zero Knowledge Protocols and Small Systems. 1995. http://www.tcm.hut.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html. • Schneier, Bruce. Applied Cryptography. 2nd Edition. John Wiley & Sons, Inc. 1996. 101-111. • Trappe, Wade and Lawrence C. Washington. Introduction to Cryptography with Coding Theory. Prentice Hall. 2002. 228 – 233.