Cryptology ePrint Archive: Report 2019/337

Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios

Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik

Abstract: In this paper we concern anonymous identification, where the verifier can check that the user belongs to a given group of users (just like in case of ring signatures), however a transcript of a session executed between a user and a verifier is deniable. That is, neither the verifier nor the prover can convice a third party that a given user has been involved in a session but also he cannot prove that any user has been interacting with the verifier. Thereby one can achieve high standards for protecting personal data according to the General Data Protection Regulation the fact that an interaction took place might be a sensitive data from information security perspective. We show a simple realization of this idea based on Schnorr identification scheme arranged like for ring signatures. We show that with minor modifications one can create a version immune to leakage of ephemeral keys. We extend the above scenario to the case of k out of n, where the prover must use at least k private keys corresponding to the set of n public keys. With the most probable setting of k = 2 or 3, we are talking about the practical case of multifactor authentication that might be necessary for applications with higher security level.

Category / Keywords: cryptographic protocols / identification scheme, ephemeral secret setting, ephemeral secret leakage, deniability, simulatability

Original Publication (with major differences): CSCML 2019

Date: received 28 Mar 2019

Contact author: marcin slowik at pwr edu pl,lukasz krzywiecki@pwr edu pl

Available format(s): PDF | BibTeX Citation

Version: 20190403:015934 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]