We study the notion of meta-proofs, which, as the name indicates, are proofs about proofs. We employ the notion of meta-proofs to produce a highly efficient oblivous proof of correct exponentiation. It is minimumknowledge independently of whether the input is valid or not, a property that does not hold for many other protocols (that are zero-knowledge only for valid inputs.) This has direct security implications to multiparty protocols, where the protocols we demonstrate -- one interactive and one non-interactive -- can be employed to obtain protocol robustness at a low cost. As a result of potential independent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Jakobsson, M., & Schnorr, C. P. (1999). Efficient Oblivious Proofs of Correct Exponentiation. In Secure Information Networks (pp. 71–84). Springer US. https://doi.org/10.1007/978-0-387-35568-9_5