[Resource Topic] 2018/870: Unifying Kleptographic Attacks

Welcome to the resource topic for 2018/870

Title:
Unifying Kleptographic Attacks

Authors: George Teseleanu

Abstract:

We present two simple backdoors that can be implemented into Maurer’s unified zero-knowledge protocol. Thus, we show that a high level abstraction can replace individual backdoors embedded into protocols for proving knowledge of a discrete logarithm (e.g. the Schnorr and Girault protocols), protocols for proving knowledge of an e^{th}-root (e.g. the Fiat-Shamir and Guillou-Quisquater protocols), protocols for proving knowledge of a discrete logarithm representation (e.g. the Okamoto protocol) and protocols for proving knowledge of an e^{th}-root representation.

ePrint: https://eprint.iacr.org/2018/870

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .