Inequality of Discrete Logarithms¶
This primitive represents a proof of knowledge of \(x\) such that two DL representations are not equal:
This protocol is a part of the BLAC scheme [HG13].
The associated class
DLNotEqual is constructed as follows:
x = Secret(value=12) stmt = DLNotEqual([y0, g0], [y1, g1], x)
Due to the internal proof construction, this proof does not bind the
x by default. To enable this feature, the proof
constructor has to be called with the parameter
Knowledge of the BBS+ Signature¶
This primitive provide a way to obtain blind signatures over a set of attribute-based credentials [ASM06].
The protocol uses group pairings (see
Obtaining a Signature¶
The idea is to request an issuer – identified by a public key
pk and a
sk – to blindly sign a list of messages \(m_i\). The user will
blind these attributes by a secret attribute \(s_1\).
The resulting number is sent to the issuer along with a proof of correct construction.
group_pair = BilinearGroupPair() keypair = Keypair(group_pair, num_generators) # Construct a UserCommitment object embedding the blinded block and the proof # of correct construction. creator = BBSPlusSignatureCreator(pk) usr_commitment = creator.commit(messages) # Get the blinded block signed by the issuer (through its secret key). It # returns a signature that we then update by adding s_1. presignature = sk.sign(lhs.com_message) signature = creator.obtain_signature(presignature)
The final signature validity can be verified by calling:
The issuer can verify the correct construction as follows:
Proving Knowledge of a Signature¶
Once the user has the final signature, she can prove she has it:
e, s = Secret(value=signature.e), Secret(value=signature.s) messages = [Secret(value=m1), ..., Secret(value=m_n)] proof = BBPlusSignatureStmt([e, s, *messages], pk, signature)
The \(e\) and \(s\) secrets are necessary so the proof can bind them to
another proof, e.g. in an AND conjunction. If you do not care about binding
\(e\) and \(s\) to other proofs, you can skip them, only pass the messages and
messages = [Secret(value=m1)..., Secret(value=mn)] stmt = BBSPlusSignatureStmt(messages, pk, signature, binding=False)
signature argument is required for the proving side.
The verifier can run this:
e, s = Secret(), Secret() # Omitted if not binding messages = [Secret(), ..., Secret()] stmt = BBSPlusSignatureStmt([e, s, *messages], pk)
Afterwards, a prover and verifier can run the proof protocol.
R. Henry and I. Goldberg, “Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting,” in Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. ACM, 2013, pp. 71–82.
M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-TAA,” in International Conference on Security and Cryptography for Networks. Springer, 2006, pp. 111–125.