Automatic Generation of Sigma-Protocols Conference Paper


Author(s): Bangerter, Endre; Briner, Thomas; Henecka, Wilko; Krenn, Stephan; Sadeghi, Ahmad-Reza; Schneider, Thomas
Editor(s): Martinelli, Fabio; Preneel, Bart
Title: Automatic Generation of Sigma-Protocols
Title Series: LNCS
Affiliation
Abstract: Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and secure multi-party computation (SMPC). Currently, first applications that essentially rely on ZK-PoKs are being deployed in the real world. The most prominent example is the Direct Anonymous Attestation (DAA) protocol, which was adopted by the Trusted Computing Group (TCG) and implemented as one of the functionalities of the cryptographic chip Trusted Platform Module (TPM). Implementing systems using ZK-PoK turns out to be challenging, since ZK-PoK are significantly more complex than standard crypto primitives (e.g., encryption and signature schemes). As a result, the design-implementation cycles of ZK-PoK are time-consuming and error-prone. To overcome this, we present a compiler with corresponding languages for the automatic generation of sound and efficient ZK-PoK based on Σ-protocols. The protocol designer using our compiler formulates the goal of a ZK-PoK proof in a high-level protocol specification language, which abstracts away unnecessary technicalities from the designer. The compiler then automatically generates the protocol implementation in Java code; alternatively, the compiler can output a description of the protocol in LaTeX which can be used for documentation or verification.
Keywords: Zero-Knowledge; Protocol Compiler; Language Design
Conference Title: EuroPKI: Public Key Infrastructures, Services and Applications
Volume: 6391
Conference Dates: September 10-11, 2009
Conference Location: Pisa, Italy
ISBN: 978-3-642-16440-8
Publisher: Springer  
Date Published: 2010-10-25
Start Page: 67
End Page: 82
Sponsor: This work was performed within the FP7 EU project CACE (Computer Aided Cryptography Engineering).
URL:
DOI: 10.1007/978-3-642-16441-5
Open access: yes (repository)
IST Austria Authors
  1. Stephan Krenn
    11 Krenn
Related IST Austria Work