Multifactor identity verification using aggregated proof of knowledge

Abhilasha Bhargav-Spantzel, Anna Squicciarini, Rui Xue, Elisa Bertino

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

The problem of identity theft, that is, the act of impersonating others identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor verification of such identifiers and proofs achieved by the development of a new cryptographic primitive, which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. The resultant signatures are very short and the ZKPs are succinct and efficient. We prove the security of our scheme under the co-gap DiffieHellman (co-GDH) assumption for groups with bilinear maps. Our cryptographic scheme is an improvement in terms of the performance, flexibility, and storage requirements than the existing efficient ZKPK techniques that may be used to prove under zero knowledge and the knowledge of multiple secrets.

Original languageEnglish (US)
Article number5447665
Pages (from-to)372-383
Number of pages12
JournalIEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
Volume40
Issue number4
DOIs
StatePublished - Jul 1 2010

Fingerprint

Network protocols
Costs

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Software
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

@article{e02e57d8987249d08c0d328387401b51,
title = "Multifactor identity verification using aggregated proof of knowledge",
abstract = "The problem of identity theft, that is, the act of impersonating others identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor verification of such identifiers and proofs achieved by the development of a new cryptographic primitive, which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. The resultant signatures are very short and the ZKPs are succinct and efficient. We prove the security of our scheme under the co-gap DiffieHellman (co-GDH) assumption for groups with bilinear maps. Our cryptographic scheme is an improvement in terms of the performance, flexibility, and storage requirements than the existing efficient ZKPK techniques that may be used to prove under zero knowledge and the knowledge of multiple secrets.",
author = "Abhilasha Bhargav-Spantzel and Anna Squicciarini and Rui Xue and Elisa Bertino",
year = "2010",
month = "7",
day = "1",
doi = "10.1109/TSMCC.2010.2045755",
language = "English (US)",
volume = "40",
pages = "372--383",
journal = "IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews",
issn = "1094-6977",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

Multifactor identity verification using aggregated proof of knowledge. / Bhargav-Spantzel, Abhilasha; Squicciarini, Anna; Xue, Rui; Bertino, Elisa.

In: IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, Vol. 40, No. 4, 5447665, 01.07.2010, p. 372-383.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Multifactor identity verification using aggregated proof of knowledge

AU - Bhargav-Spantzel, Abhilasha

AU - Squicciarini, Anna

AU - Xue, Rui

AU - Bertino, Elisa

PY - 2010/7/1

Y1 - 2010/7/1

N2 - The problem of identity theft, that is, the act of impersonating others identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor verification of such identifiers and proofs achieved by the development of a new cryptographic primitive, which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. The resultant signatures are very short and the ZKPs are succinct and efficient. We prove the security of our scheme under the co-gap DiffieHellman (co-GDH) assumption for groups with bilinear maps. Our cryptographic scheme is an improvement in terms of the performance, flexibility, and storage requirements than the existing efficient ZKPK techniques that may be used to prove under zero knowledge and the knowledge of multiple secrets.

AB - The problem of identity theft, that is, the act of impersonating others identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor verification of such identifiers and proofs achieved by the development of a new cryptographic primitive, which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. The resultant signatures are very short and the ZKPs are succinct and efficient. We prove the security of our scheme under the co-gap DiffieHellman (co-GDH) assumption for groups with bilinear maps. Our cryptographic scheme is an improvement in terms of the performance, flexibility, and storage requirements than the existing efficient ZKPK techniques that may be used to prove under zero knowledge and the knowledge of multiple secrets.

UR - http://www.scopus.com/inward/record.url?scp=77953719966&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77953719966&partnerID=8YFLogxK

U2 - 10.1109/TSMCC.2010.2045755

DO - 10.1109/TSMCC.2010.2045755

M3 - Article

AN - SCOPUS:77953719966

VL - 40

SP - 372

EP - 383

JO - IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews

JF - IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews

SN - 1094-6977

IS - 4

M1 - 5447665

ER -