WO1992014318A1 - Method, identification device and verification device for identification and/or performing digital signature - Google Patents

Method, identification device and verification device for identification and/or performing digital signature Download PDF

Info

Publication number
WO1992014318A1
WO1992014318A1 PCT/EP1992/000045 EP9200045W WO9214318A1 WO 1992014318 A1 WO1992014318 A1 WO 1992014318A1 EP 9200045 W EP9200045 W EP 9200045W WO 9214318 A1 WO9214318 A1 WO 9214318A1
Authority
WO
WIPO (PCT)
Prior art keywords
mod
data
computes
sends
numbers
Prior art date
Application number
PCT/EP1992/000045
Other languages
French (fr)
Inventor
David Naccache
Original Assignee
Thomson Consumer Electronics S.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Consumer Electronics S.A. filed Critical Thomson Consumer Electronics S.A.
Priority to JP50246092A priority Critical patent/JP3456993B2/en
Priority to DE69202699T priority patent/DE69202699T2/en
Priority to AU11592/92A priority patent/AU648643B2/en
Priority to US08/094,058 priority patent/US5502764A/en
Priority to EP92902236A priority patent/EP0570388B1/en
Publication of WO1992014318A1 publication Critical patent/WO1992014318A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to a method, identification device and verification device for identification and/or per ⁇ forming digital signature which allows zero-knowledge access control.
  • roots modulo X are used where X is a composite number having at least two large prime factors.
  • X is a composite number having at least two large prime factors.
  • the factoring of X is known to some users.
  • One example is the algorithm " ⁇ ue to Rabin which is disclosed in "Probabilistic Algorithm*-*", in S. Traub Ed., "Algorithms and Complexity, New Directions and Recent Results", Academic press, New York, 1976, 21-24.
  • the inventive method consists in computing data by an authority and recording on an identification device U, comprising the following first steps: - choosing and publishing a modulus X, a power d and a func ⁇ tion H, whereby X is a product of at least two big prime num ⁇ bers and H is a one-way pseudo-random function;
  • SD d mod X (PK ⁇ &...& PK fe & PN & ID), whereby in case of (PK-. &. . . & PK, & PN & ID) having no d-th root either the order of the PK 1. can be p ⁇ ermuted until a root is found or a small arbitrary string J can be appended to (PK j , &. . . & PK, & PN & ID) in such a way that (J & PK ⁇ &. . . & PK, & PN & ID) has a d-th root;
  • V H(R 1 d mod X &... & R ⁇ mod X) to V; c) V computes SD mod X, checks that said pattern data PN is valid, separates said small prime numbers PK. which are in ⁇ side SD mod X, picks a set ⁇ c. , ... ,c. ⁇ of h numbers c. such that each 0 ⁇ ci. ⁇ k and sends them to U; d) U computes h values
  • RESP 1. (if (c1. eq ⁇ ual 0) ' then R1. else R1.SKC1. mod X)' and sends the set (RESP-,, ... ,RESP, ] of said h values RESP. to V; e) V checks U's identity by verifying that
  • Z H(R 1 d mod X &. . . & R d mod X & m) and reads said number Z as a set ⁇ c., ...,c, ⁇ of h numbers c.
  • RESPi. (if (cl. eq ⁇ ual 0) ' then R1. else Rl.SKci. mod X)' and sends the set ⁇ Z , m, RESP, , ...,RESP, ) to V; e) V checks U' s signature on m by verifying that
  • the inventive identification device contains first computation means (15), first memory means (16) which are connected to said first computation means and first data exchange means (14) which are connected to said first cor:-pu- tation means, whereby said first memory means store said seed data SD, said modulus X, said function H and said set [SK.. , ... ,SK, ] of numbers SK. and whereby said data exchange means send data to and receive data from said verification device (17) .
  • the inventive verification device contains sec ⁇ ond computation means (12), second memory means (11) which are connected to said second computation means and second data exchange means (13) which are connected to said second computation means, whereby said second memory means store said modulus X and said function H and whereby said data ex ⁇ change means send data to and receive data from said identi ⁇ fication device (18) and whereby said second computation means verify data received from said identification device.
  • the inventive access control system allows to create unforgeable identification devices which communicate with a verifier device and it has many practical applications in Pay-TV, credit-cards, dongles, passports, door-keys, comput ⁇ ers, terminals etc .
  • the algorithm is based on quadratic residuosity in a finite ring i.e. on the difficulty to compute square (or higher) roots modulo X where X is a composite number having at least two strong prime factors. These prime factors must keep the following conditions:
  • An illimited number of users can join the system without informing the verifiers nor compro ⁇ mizing the system's security.
  • H is a cryptographically strong one-way pseudo-random hash function mapping w, , ? , ... ,w, to a long arbitrary string H(w, & w- &...& w, ) .
  • Any authorized identification device U e.g. a smart-card, must be able to present a variety of k (typically in the range [8, 20]) roots to the verifier V.
  • the verifier will randomly choose h (typically in the range [3, 10]) of these inverse roots which will then be hidden by h random numbers (thereby insuring the zero-knowledge property of the scheme because computing roots modulo X is as hard as factoring X) and presented by the smart-card.
  • the authority picks a set of small random primes denoted PK.. , PK_, ... , PK, that have roots modulo X and concatenates them with (e.g. a part of X) public pattern data PN and useful information (such as date of validity, name, rights etc, herein denoted ID) and com ⁇ putes the root modulo X of PK-, &. . . & PK, S. PN &. ID (this root is denoted SD) .
  • PK.1, &...& PK.k & PN & ID has no root
  • the order of the PKl. can be permuted until such a root value is found.
  • the proba ⁇ bility not to find a good root decreases exponentially with the number of attempted permutations.
  • the identification device U wants to prove to a verifi ⁇ eerr VV tthhaatt iitt kknnoowwss tthhee SSKK.. wwiitthhoouutt ddii ⁇ sclosing their values, the following protocol is carried out: 1) U sends seed data SD to V.
  • V computes SD mod X, checks that the pattern data PN is
  • RESP 1. ( ⁇ if ( v c1. eq ⁇ ual 0) ' then R1. else R1.SKCl. mod X) ' and sends the set ⁇ RESP-, ... ,RESP, ] to V.
  • V checks U's identity by verifying that
  • a digital signature of a message ⁇ i is performed by the fol ⁇ lowing protocol:
  • V computes SD mod X, checks that said pattern data PN is valid and separates said small prime numbers PK.
  • Z ' H(R 2 mod X &. . . &. R 2 mod X & m) and reads said number Z as a set [c-,...,c, ⁇ of h numbers c. such that each O ⁇ cl. ⁇ k;'
  • RESP 1. (if ( x c1. eq ⁇ ual 0) ' then R1. else R1.SKCl. mod X) and sends the set ⁇ Z, m, RESP.,, ... ,RESP h J to V; 5) V checks U's signat a on m by verifying that
  • Fig. 1 shows an identification device and a verification ⁇ tion device
  • Fig. 2 shows a first authentication protocol between the identification and the verification device
  • Fig. 3 shows stored and computed data and a flow chart for the identification device
  • Fig. 4 shows stored and computed data and a flow chart for the verification device.
  • a verification device 17 and an identification de ⁇ vice 18 are depicted.
  • the identification device contains a first microprocessor 15, a first memory 16 which is connect ⁇ ed to the first microprocessor 15 and a first connector 14 for data exchange with the verification device 17.
  • the verification device 17 contains a second microprocessor 12, a second memory 11 which is connected to the second mi ⁇ croprocessor 12 and a second connector 13 for data exchange with the identification device 18.
  • the first memory 16 stores seed data SD, a modulus X, a func ⁇ tion H and a set ⁇ SK.. , ... SK, ] of numbers SK..
  • the first mi ⁇ croprocessor 15 computes data as shown in Fig. 3.
  • the first memory 16 may be used to store intermediate results.
  • the da ⁇ ta send to and received from the identifier I/O interface of Fig. 3 pass the first connector 14.
  • the second memory 11 stores a modulus X and a function H.
  • the second microprocessor 12 computes data as shown in Fig. 4.
  • the second memory 11 may be used to store intermediate re ⁇ sults.
  • the data send to and received from the verifier I/O interface of Fig. 4 pass the second connector 13.
  • Fig. 2 illustrates by way of a first protocol which data can be computed and exchanged between the identification device 18 and the verification device 17. The following steps are carried out in the identification device U 18 and in the verification device V 17:
  • V has computed SD mod X and checked that the pattern data PN is valid and separated the
  • V picks a set ⁇ c.,...,c, ⁇ of h numbers c. such that each O ⁇ c 1. ⁇ k and sends them to U.
  • the pseudo-random function H can be replaced by a pseudo-ran ⁇ dom hash function H applied on an algebraic function P.
  • Fig. 3 shows which data are computed in the first micropro ⁇ cessor 15 and exchanged with the verification device.
  • Fig. 4 shows which data are computed in the second micropro ⁇ cessor 12 and exchanged with the identification device.
  • a range [8, 20] is preferred for k.
  • a range [3, 10] is preferred for h.
  • the length of the numbers SK. is greater equal 1 byte and less equal 8 bytes.
  • the invention can be generalized in a variety of ways, the most evident are:
  • the small prime numbers PK can be recorded in a public di ⁇ rectory
  • PK values obtained by the application of a random function on ID For example a table of t small primes can be generated or recorded in the verification device and the t-th bit of f(ID) can be used to indicate PK. (e.g. : 0 - this is not a public key, 1 - this is a public key) .
  • f is a pseudo random function.
  • a range [8, 20] is preferred for t;
  • the protocols can be repeated e times (e greater than 1) to increase the strength exponentially.
  • the pseudo-random function H can be re ⁇ placed by a hash function applied on an algebraic function (e.g. a linear combination or a polynomial)

Abstract

The present invention relates to a method, identification device and verification device for identification and/or performing digital signature which allows zero-knowledge access control. For many applications, e.g. smart cards for Pay-TV purposes, credit cards, passports, dongels or other kind of electronic keys, unforgeable systems for access control or digital signature are required. Such access control and signature systems may include public keys. But in many of such public key systems the key management becomes very complicated when the number of users increases. The invention uses the fact that it is difficult to compute roots mod n when factoring of n is unknown. The invention is based on the identity: x?d(x?-1)?d = 1 mod n which is computed and verified between an identification device and a verification device. An authority records seed data, the modulus n, a pseudo-random function and a set of numbers derived from roots modulo n on an identifier device. The public key directory is replaced by a unique transmission of seed data from the identifier to a verifier, which will give after a proper processing both, the identity information for the identifier and public keys.

Description

Method, identification device and verification device for identification and/or performing digital signature
The present invention relates to a method, identification device and verification device for identification and/or per¬ forming digital signature which allows zero-knowledge access control.
Background
In access control systems roots modulo X are used where X is a composite number having at least two large prime factors. There are such access control systems where the factoring of X is known to some users. One example is the algorithm "^ue to Rabin which is disclosed in "Probabilistic Algorithm*-*", in S. Traub Ed., "Algorithms and Complexity, New Directions and Recent Results", Academic press, New York, 1976, 21-24.
Invention
It is one object of the invention to disclose a method for preparing identification and/or digital signature which al¬ lows zero-knowledge access control. This object is reached by the inventive method disclosed in claim 1.
It is a further object of the invention to disclose a method for performing identification and/or digital signature. This object is reached by and advantageous additional embodiments of the inventive method are resulting from the respective dependent claims.
In principle the inventive method consists in computing data by an authority and recording on an identification device U, comprising the following first steps: - choosing and publishing a modulus X, a power d and a func¬ tion H, whereby X is a product of at least two big prime num¬ bers and H is a one-way pseudo-random function;
- computing a set {PK, , ... ,PK, } of k small prime numbers PK. such that each PKl. has a root modulo X;'
- concatenating said small prime numbers PK. with pattern data PN, especially a part of X, and with specific informa¬ tion data ID which contain information about said identifica¬ tion device U and producing seed data SD such that
SDd mod X = (PKχ &...& PKfe & PN & ID), whereby in case of (PK-. &. . . & PK, & PN & ID) having no d-th root either the order of the PK 1. can be p ^ermuted until a root is found or a small arbitrary string J can be appended to (PKj, &. . . & PK, & PN & ID) in such a way that (J & PKχ &. . . & PK, & PN & ID) has a d-th root;
- recording on said identification device U (18) said seed data SD and/or said modulus X and/or said function H and/or } of numbers SK. which are defined by
Figure imgf000004_0001
Thereafter in case of identification the following second steps (Fig. 2) are carried out in said identification device U (18) and/or in a verification device V (17): a) U sends said seed data SD to V; b) U picks h random numbers R. in the jrange f -J(X), X], com¬ putes and sends a number 2 defined by
Z = H(R1 d mod X &... & R^ mod X) to V; c) V computes SD mod X, checks that said pattern data PN is valid, separates said small prime numbers PK. which are in¬ side SD mod X, picks a set {c. , ... ,c. } of h numbers c. such that each 0<ci.<k and sends them to U; d) U computes h values
RESP 1. = (if (c1. eq^ual 0) ' then R1. else R1.SKC1. mod X)' and sends the set (RESP-,, ... ,RESP, ] of said h values RESP. to V; e) V checks U's identity by verifying that
Z = H(&&(if (c. equal 0) then 1 else PK )RESP d mod X); and in case of performing digital signature of a message m the following second steps are carried out in said identifi¬ cation device U (18) and/or in a verification device V (17): a) U sends said seed data SD to V; b) V computes SD mod X, checks that said pattern data PN is valid and separates said small prime numbers PK. which are j inside SD mod X; c) U picks h random numbers R. in the range [ -T(X), X], and computes a number Z defined by
Z = H(R1 d mod X &. . . & R d mod X & m) and reads said number Z as a set {c., ...,c, } of h numbers c.
' 1 h' l
Figure imgf000005_0001
d) U computes h values
RESPi. = (if (cl. eq^ual 0) ' then R1. else Rl.SKci. mod X)' and sends the set { Z , m, RESP, , ...,RESP, ) to V; e) V checks U' s signature on m by verifying that
Z = H(&&(if (c. equal 0) then 1 else PK .)RESP.d mod X & m) .
It is a further object of the invention to disclose an iden¬ tification device and a verification device, respectively, for the inventive method. This object is reached by the in¬ ventive identification device and verification device dis¬ closed in claims 11 and 12, respectively.
In principle the inventive identification device contains first computation means (15), first memory means (16) which are connected to said first computation means and first data exchange means (14) which are connected to said first cor:-pu- tation means, whereby said first memory means store said seed data SD, said modulus X, said function H and said set [SK.. , ... ,SK, ] of numbers SK. and whereby said data exchange means send data to and receive data from said verification device (17) .
In principle the inventive verification device contains sec¬ ond computation means (12), second memory means (11) which are connected to said second computation means and second data exchange means (13) which are connected to said second computation means, whereby said second memory means store said modulus X and said function H and whereby said data ex¬ change means send data to and receive data from said identi¬ fication device (18) and whereby said second computation means verify data received from said identification device.
Advantageous additional embodiments of the inventive identi¬ fication device are resulting from the respective dependent claim.
The inventive access control system allows to create unforgeable identification devices which communicate with a verifier device and it has many practical applications in Pay-TV, credit-cards, dongles, passports, door-keys, comput¬ ers, terminals etc .
The algorithm is based on quadratic residuosity in a finite ring i.e. on the difficulty to compute square (or higher) roots modulo X where X is a composite number having at least two strong prime factors. These prime factors must keep the following conditions:
1) X = pq, where length(p) is approximately equal to length(q) .
2) Both (p-1) and (q-1) contain large prime factors.
3) The greatest common divisor of (p-1) and (q-1) is small.
The main characteristics of the access control system are:
1) The algorithm is provably zero-knowledge.
2) An illimited number of users (identification devices) can join the system without informing the verifiers nor compro¬ mizing the system's security.
3) Only the authority knows the factoring of X.
4) No modular exponentiations are required, only multiplica¬ tions and squarings.
5) Attacks against one user do not compromize the security of the whole scheme. Conventions all along this invention are:
1) "&" will stand for the concatenation operation.
2) "&&Expr." stands for "Expr-, S. Expr_ &. . . & Expr, " .
3) H is a cryptographically strong one-way pseudo-random hash function mapping w, , ?, ... ,w, to a long arbitrary string H(w, & w- &...& w, ) .
Any authorized identification device U, e.g. a smart-card, must be able to present a variety of k (typically in the range [8, 20]) roots to the verifier V. The verifier will randomly choose h (typically in the range [3, 10]) of these inverse roots which will then be hidden by h random numbers (thereby insuring the zero-knowledge property of the scheme because computing roots modulo X is as hard as factoring X) and presented by the smart-card.
Before issuing smart-cards, the authority picks a set of small random primes denoted PK.. , PK_, ... , PK, that have roots modulo X and concatenates them with (e.g. a part of X) public pattern data PN and useful information (such as date of validity, name, rights etc, herein denoted ID) and com¬ putes the root modulo X of PK-, &. . . & PK, S. PN &. ID (this root is denoted SD) .
If PK.1, &...& PK.k & PN & ID has no root, the order of the PKl. can be permuted until such a root value is found. The proba¬ bility not to find a good root decreases exponentially with the number of attempted permutations.
When SD is finally found, the authority records on said smart-card SD, X and the pseudo-random function H together with PK-1~ " ,'...,'PK.k~ ' . From here on PKl." * will be denot- ed SK 1.. The roots are taken modulo X.
When the identification device U wants to prove to a verifi¬ eerr VV tthhaatt iitt kknnoowwss tthhee SSKK.. wwiitthhoouutt ddii∑sclosing their values, the following protocol is carried out: 1) U sends seed data SD to V.
2) U picks h random numbers R. in the range [-T(X), X], com¬ putes and sends
Z - H^2 mod X &. . . & Rfa 2 mod X) to V.
2
3) V computes SD mod X, checks that the pattern data PN is
2 valid, separates the PK. (found inside SD mod X), picks a set {1c1. , ... ,ch, }1 of h numbers ci. such that each O≤ci.≤k and sends them to U.
4) U computes h values
RESP 1. = (λif (vc1. eq^ual 0) ' then R1. else R1.SKCl. mod X) ' and sends the set {RESP-, ... ,RESP, ] to V.
5) V checks U's identity by verifying that
Z = H(<S& (If (c. equal 0) then 1 else PK .)RESP.2 mod X)
A digital signature of a message πi is performed by the fol¬ lowing protocol:
1) U sends seed data SD to V.
2
2) V computes SD mod X, checks that said pattern data PN is valid and separates said small prime numbers PK. which are
2 * 1 inside SD mod X;
3) U picks h random numbers R. in the range [-T(X), X], and computes a number Z defined by
Z '= H(R 2 mod X &. . . &. R 2 mod X & m) and reads said number Z as a set [c-,...,c, } of h numbers c. such that each O≤cl.≤k;'
4) U computes h values
RESP 1. = (if (xc1. eq^ual 0) ' then R1. else R1.SKCl. mod X) and sends the set {Z, m, RESP.,, ... ,RESPhJ to V; 5) V checks U's signat a on m by verifying that
Z = H(&&(if (c. equal 0) then 1 else PK .)RESP.2 mod X & m).
Drawings
Preferred embodiments of the invention will now be described with reference to the accompanying drawings, in which:
Fig. 1 shows an identification device and a verifica¬ tion device;
Fig. 2 shows a first authentication protocol between the identification and the verification device;
Fig. 3 shows stored and computed data and a flow chart for the identification device;
Fig. 4 shows stored and computed data and a flow chart for the verification device.
Preferred embodiments
In Fig. 1 a verification device 17 and an identification de¬ vice 18 are depicted. The identification device contains a first microprocessor 15, a first memory 16 which is connect¬ ed to the first microprocessor 15 and a first connector 14 for data exchange with the verification device 17. The verification device 17 contains a second microprocessor 12, a second memory 11 which is connected to the second mi¬ croprocessor 12 and a second connector 13 for data exchange with the identification device 18.
The first memory 16 stores seed data SD, a modulus X, a func¬ tion H and a set {SK.. , ... SK, ] of numbers SK.. The first mi¬ croprocessor 15 computes data as shown in Fig. 3. The first memory 16 may be used to store intermediate results. The da¬ ta send to and received from the identifier I/O interface of Fig. 3 pass the first connector 14. S
The second memory 11 stores a modulus X and a function H. The second microprocessor 12 computes data as shown in Fig. 4. The second memory 11 may be used to store intermediate re¬ sults. The data send to and received from the verifier I/O interface of Fig. 4 pass the second connector 13.
Fig. 2 illustrates by way of a first protocol which data can be computed and exchanged between the identification device 18 and the verification device 17. The following steps are carried out in the identification device U 18 and in the verification device V 17:
2 U has send seed data SD to V. V has computed SD mod X and checked that the pattern data PN is valid and separated the
2 small prime numbers PK. which are inside SD mod X.
U picks h random numbers R. in the range f-J"(X), X], computes and sends a number Z define 1d by Z = H(R,2 mod X <S...& R, 2 mod X) to V. V picks a set {c.,...,c, } of h numbers c. such that each O≤c 1.≤k and sends them to U.
U computes h values RESP. = (if (c. equal 0) then R. else
Rl.SKci. mod X) ' and sends the set Y = {'RESP.1, ,' ... ,'RESP h, ]i of said h values RESP. to V. V checks U's identity by comparing
Z and the value of H(&<£(if (c. e-qual 0) then 1 else
PK . )RESP. 2 mod X). If these v~Lalues are equal the claimed identity of U is accepted.
The pseudo-random function H can be replaced by a pseudo-ran¬ dom hash function H applied on an algebraic function P. In
2 2 this case the number Z is defined by Z = H(P(R. &. . . & R, ) mod X). For checking U's identity V computes h values
{ -, , ... , , } defined by . = (if (c. equal 0) then 1 else
PKci.')RESPl. mod X and verifies that Z = H(P(vL-1, , ... ,L,r) mod
X).
Fig. 3 shows which data are computed in the first micropro¬ cessor 15 and exchanged with the verification device. Fig. 4 shows which data are computed in the second micropro¬ cessor 12 and exchanged with the identification device.
A range [8, 20] is preferred for k.
A range [3, 10] is preferred for h.
Advantageously s has the value s = 2*h.
Advantageously the length of the numbers SK. is greater equal 1 byte and less equal 8 bytes.
The invention can be generalized in a variety of ways, the most evident are:
- The small prime numbers PK can be recorded in a public di¬ rectory;
- Using third or higher roots instead of second powers;
- Using a modulus X which is the product of more then two big prime factors;
- Increasing the size of X. An advantageous value is 512 bits = 64 bytes;
- Replacing modulo X by any other finite field;
- Using other PK values obtained by the application of a random function on ID. For example a table of t small primes can be generated or recorded in the verification device and the t-th bit of f(ID) can be used to indicate PK. (e.g. : 0 - this is not a public key, 1 - this is a public key) . Here f is a pseudo random function. A range [8, 20] is preferred for t;
- The protocols can be repeated e times (e greater than 1) to increase the strength exponentially.
- Advantageously the pseudo-random function H can be re¬ placed by a hash function applied on an algebraic function (e.g. a linear combination or a polynomial)
Z = H(P(R1 d, ... , Rh d) mod X) .
This avoids h-1 modular reductions to U whilst V will check that Z = H(P(R1 d mod X, ... ,Rh d mod X) mod X) .

Claims

Claims
1. Method for identification and/or performing digital sig¬ nature, whereby data are computed by an authority and recorded on an identification device U (18), comprising the first steps of:
- choosing and publishing a modulus X, a power d and a function H, whereby X is a product of at least two big prime numbers and H is a one-way pseudo-random function;
- computing a set {PK.. , ... ,PK, ] of k small prime num¬ bers PK 1. such that each PK1. has a root modulo X;
- concatenating said small prime numbers PK. with pat¬ tern data PN, especially a part of X, and with specific information data ID which contain information about said identification device U and producing seed data SD such that
SDd mod X = (PK-j^ & . . . & PKk & PN & ID), whereby in case of (PK-, &. . . & PK, & PN & ID) having no d-th root either the order of the PK. can be permuted until a root is found or a small arbitrary string J can be appended to (PK-. &. . . & PK, & PN & ID) in such a way that (J & PK-j^ &. . . & PKfc & PN & ID) has a d-th root; - recording on said identification device U (18) said seed data SD and/or said modulus X and/or said function H and/or a set {SK- , ... ,SK, } of numbers SK. which are defined by - SKi. PKi. mod X = 1.
2. Method according to claim 1, characterized in that in case of identification the following second steps (Fig. 2) are carried out in said identification device U (18) and/or in a verification device V (17): a) U sends said seed data SD to V; b) U picks h random numbers R. in the range [ -T(X), X], computes and sends a number Z defined by
Z = H(R d mod X &. . . & R^ mod X) to V; c) V computes SD mod X, checks that said pattern data PN is valid, separates said small prime numbers PK. which are inside SD mod X, picks a set {c,, ...,c, ] of h numbers c. such that each O≤c.≤k and sends them to U; d) U computes h values
RREESSPPl.. == ((iiff ((vccl.. eeqq^uuaall 0C ) ' then R1. else Rl.SKci. mod X) ' and sends the set {RESP.. , ... ,RESP, } of said h values
Figure imgf000013_0001
e) V checks U's identity by verifying that
Z = H(&&(if (c X. equal 0) then 1 else PK X.)RESPX.d mod X)
Method according to claim 1, characterized in that in case of performing digital signature of a message m the following second steps are carried out in said identifi¬ cation device U (18) and/or in a verification device V (17): a) U sends said seed data SD to V; b) V computes SD mod X, checks that said pattern data PN is valid and separates said small prime numbers PK. which are inside SD mod X; c) U picks h random numbers R. in the range [ -T(X), X], and computes a number Z defined by
Z = H(R1 d mod X &. . . & Rh d mod X & m) and reads said number Z as a set [c-,...,c, } of h num¬ bers c 1. such that each O≤c1.≤k; d) U computes h values
RESPl. = (if (cl. equal 0) ' then R1. else Ri.SKci. mod X) and sends the set {Z, m, RESP., , ...,RESP, ] to V; e) V checks U's signature on m by verifying that
Z = H(&<£(if (c X. equal 0) then 1 else PKm-X.)RESPX.d mod X
& m) .
Method according to claim 2, characterized in that said pseudo-random function H is replaced by a pseudo-random hash function H applied on an algebraic function P and that steps b) and e) of said second steps are replaced by: b) U picks h random numbers R. in the range [ -T(X), X] , computes and sends a number Z defined by Z = H(P (R1 d &. . . & Rh d) mod X) to V; e) V computes h values {L1,...,L, },
Li. = (xif (vcl. eq^ual 0) ' then 1 else PKci.)7RESPi.d mod X and checks U' s identity by verifying that Z = H(P(L , ..., h) mod X).
5. Method according to claim 1, characterized in that in case of identification the following second steps (Fig. 5) are carried out in said identification device U (18) and/or in a verification device V (17): a) U sends said seed data SD to V; b) U picks s≥h random numbers R. and/or R. in the range [ -*T(X), X], computes and sends a number Z defined by
Z = H((Rn *-.. * Re)d mod X) to V; c) V computes SDd mod X, checks that said pattern data
PN is valid, separates said small prime numbers PK. which are inside SD mod X, picks a set {c.,...,c, ] of h numbers c 1. such that each O≤c1.≤k and sends them to U; d) V picks and sends to U a set {v,,...,v, ] of h binary vectors v 1. and/or vJ., whereby the length of each v1. is s bits and whereby
(if ((i not e-qual j) and (u-th bit of v. equal '1')) then (u-th bit of v. equal '0')) and whereby at least one bit in each v. is set to '1'; e) U computes h values {a.,...,a, j whereby a. = (product for j=l to s (if (j-th bit of v. equal ' 1' ) then R. else 1) ); f) U computes h values
RESPi. = (if (cl. eq^ual 0) ' then a1. else a1.SKci. mod X) ' and sends the set {RESP- , ... ,RESP, } of said h values RESP. to V; g) V checks U's identity by verifying that
Z = H(produkt for i=l to h (if (c. equal 0) then 1 else PK -L*X. )RESPX.d mod X).
6. Method according to claim 3, characterized in that said pseudo-random function H is replaced by a pseudo-random hash function H applied on an algebraic function P and that steps c) and e) of said second steps are replaced by: c) U picks h random numbers R. in the range [ -T(X), X] , computes and sends a number Z defined by
Z = H((P(R1 d mod X & . . . & R d) mod X) & m) to V; e) V computes h values {L- , ... , L, ]
Lx. = (if (cx. equal 0) then 1 else PK x. )RESPx.d .mod X and checks U's signature on m by verifying that Z = H((P(L1, ... ,Lh) mod X) & m) .
7. Method according to any of claims 1 to 6, characteri¬ zed in that said small prime numbers PK. are a random function of said information data ID, especially by mak¬ ing a table of t small prime numbers in said verifier device V and using the t-th bit of f(ID) to indicate
PK. , whereby f is a second pseudo-random function.
8. Method according to any of claims 1 to 7, characteri¬ zed in that said small prime numbers PK. are recorded in a public directory known to said verification device V.
9. Method according to any of claims 1 to 8, characteri¬ zed in that X is about 64 bytes long and/or 3≤h≤10 and/or s=2*h and/or 8≤k≤20 and/or 8≤t≤20 and/or that the length of said numbers SK. is greater equal 1 byte and less equal 8 bytes.
10. Method according to any of claims 2 to 9, characteri¬ zed in that said second steps are repeated e>l times.
11. Identification device U (18) which uses a method accord¬ ing to any of claims 1 to 10, containing first computa¬ tion means (15), first memory means (16) which are con¬ nected to said first computation means and first data exchange means (14) which are connected to said first Λ ψ computation means, whereby said first memory means store said seed data SD, said modulus X, said function H and said set {SK- , ... ,SK, ] of numbers SK. and whereby said data exchange means send data to and receive data from said verification device V (17).
12. Verification device V (17) which uses a method accord¬ ing to any of claims 1 to 11, containing second computa¬ tion means (12), second memory means (11) which are con¬ nected to said second computation means and second data exchange means (13) which are connected to said second computation means, whereby said second memory means store said modulus X and said function H and whereby said data exchange means send data to and receive data from said identification device U (18) and whereby said second computation means verify data received from said identification device U (18).
13. Identification device according to claim 11, characte¬ rized in that said identification device U (18) is a smart-card or a computer or a terminal or a credit-card or a dongle or a passport or a door-key.
PCT/EP1992/000045 1991-01-11 1992-01-11 Method, identification device and verification device for identification and/or performing digital signature WO1992014318A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP50246092A JP3456993B2 (en) 1991-02-07 1992-01-11 Method and identification device and verification device for performing identification and / or digital signature
DE69202699T DE69202699T2 (en) 1991-02-07 1992-01-11 Process, identification and verification device for the identification and / or execution of digital signatures.
AU11592/92A AU648643B2 (en) 1991-02-07 1992-01-11 Method, identification device and verification device for identification and/or performing digital signature
US08/094,058 US5502764A (en) 1991-01-11 1992-01-11 Method, identification device and verification device for identificaiton and/or performing digital signature
EP92902236A EP0570388B1 (en) 1991-02-07 1992-01-11 Method, identification device and verification device for identification and/or performing digital signature

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP91400301 1991-02-07
EP91400301.7 1991-02-07

Publications (1)

Publication Number Publication Date
WO1992014318A1 true WO1992014318A1 (en) 1992-08-20

Family

ID=8208540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1992/000045 WO1992014318A1 (en) 1991-01-11 1992-01-11 Method, identification device and verification device for identification and/or performing digital signature

Country Status (7)

Country Link
US (1) US5502764A (en)
EP (2) EP0502559A3 (en)
JP (1) JP3456993B2 (en)
AU (1) AU648643B2 (en)
CA (1) CA2101322A1 (en)
DE (1) DE69202699T2 (en)
WO (1) WO1992014318A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
US5627893A (en) * 1992-12-22 1997-05-06 Telstra Corporation Limited Cryptographic method

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6266771B1 (en) 1997-02-10 2001-07-24 The Regents Of The University Of California Probabilistic signature scheme
FR2763451B1 (en) * 1997-05-13 1999-06-18 France Telecom PUBLIC KEY IDENTIFICATION METHOD USING TWO HASH FUNCTIONS
US6085976A (en) 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
US6212637B1 (en) * 1997-07-04 2001-04-03 Nippon Telegraph And Telephone Corporation Method and apparatus for en-bloc verification of plural digital signatures and recording medium with the method recorded thereon
US6757826B1 (en) 1998-04-14 2004-06-29 Citicorp Development Center, Inc. Digital graphic signature system
RU2153191C2 (en) 1998-09-29 2000-07-20 Закрытое акционерное общество "Алкорсофт" Method for blind production of digital rsa signature and device which implements said method
RU2157001C2 (en) 1998-11-25 2000-09-27 Закрытое акционерное общество "Алкорсофт" Method for conducting transactions
US6732113B1 (en) * 1999-09-20 2004-05-04 Verispan, L.L.C. System and method for generating de-identified health care data
JP2003510694A (en) 1999-09-20 2003-03-18 クインタイルズ トランスナショナル コーポレイション System and method for analyzing anonymized health care information
US6876991B1 (en) 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform
US6857067B2 (en) * 2000-09-01 2005-02-15 Martin S. Edelman System and method for preventing unauthorized access to electronic data
US7194618B1 (en) 2001-03-05 2007-03-20 Suominen Edwin A Encryption and authentication systems and methods
FR2822002B1 (en) * 2001-03-12 2003-06-06 France Telecom CRYPTOGRAPHIC AUTHENTICATION BY EPHEMER MODULES
US7079986B2 (en) * 2003-12-31 2006-07-18 Sieracki Jeffrey M Greedy adaptive signature discrimination system and method
US8271200B2 (en) * 2003-12-31 2012-09-18 Sieracki Jeffrey M System and method for acoustic signature extraction, detection, discrimination, and localization
US8478539B2 (en) * 2003-12-31 2013-07-02 Jeffrey M. Sieracki System and method for neurological activity signature determination, discrimination, and detection
US9355273B2 (en) * 2006-12-18 2016-05-31 Bank Of America, N.A., As Collateral Agent System and method for the protection and de-identification of health care data
KR101273465B1 (en) * 2007-03-16 2013-06-14 재단법인서울대학교산학협력재단 Apparatus for batch verification and method using the same
US20090106331A1 (en) * 2007-10-22 2009-04-23 General Electric Company Dynamic two-stage clinical data archiving and retrieval solution
US20100114607A1 (en) * 2008-11-04 2010-05-06 Sdi Health Llc Method and system for providing reports and segmentation of physician activities
JPWO2010067820A1 (en) * 2008-12-11 2012-05-24 日本電気株式会社 Zero knowledge proof system, zero knowledge proof device, zero knowledge verification device, zero knowledge proof method and program thereof
US9141758B2 (en) * 2009-02-20 2015-09-22 Ims Health Incorporated System and method for encrypting provider identifiers on medical service claim transactions
US8805083B1 (en) 2010-03-21 2014-08-12 Jeffrey M. Sieracki System and method for discriminating constituents of image by complex spectral signature extraction
US9691395B1 (en) 2011-12-31 2017-06-27 Reality Analytics, Inc. System and method for taxonomically distinguishing unconstrained signal data segments
US9886945B1 (en) 2011-07-03 2018-02-06 Reality Analytics, Inc. System and method for taxonomically distinguishing sample data captured from biota sources
US9558762B1 (en) 2011-07-03 2017-01-31 Reality Analytics, Inc. System and method for distinguishing source from unconstrained acoustic signals emitted thereby in context agnostic manner
US11900674B2 (en) 2021-07-08 2024-02-13 Bank Of America Corporation System for real-time identification of unauthorized access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0311470A1 (en) * 1987-09-07 1989-04-12 France Telecom Methods and systems to authenticate authorizations and messages with a zero knowledge-proof system and to provide messages with a signature
EP0325238A2 (en) * 1988-01-19 1989-07-26 Yeda Research And Development Company Limited Improved variants of the Fiat-Shamir identification and signature scheme

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US5218637A (en) * 1987-09-07 1993-06-08 L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espace Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0311470A1 (en) * 1987-09-07 1989-04-12 France Telecom Methods and systems to authenticate authorizations and messages with a zero knowledge-proof system and to provide messages with a signature
EP0325238A2 (en) * 1988-01-19 1989-07-26 Yeda Research And Development Company Limited Improved variants of the Fiat-Shamir identification and signature scheme

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5627893A (en) * 1992-12-22 1997-05-06 Telstra Corporation Limited Cryptographic method
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system

Also Published As

Publication number Publication date
DE69202699T2 (en) 1996-01-18
EP0502559A2 (en) 1992-09-09
AU1159292A (en) 1992-09-07
US5502764A (en) 1996-03-26
AU648643B2 (en) 1994-04-28
EP0570388A1 (en) 1993-11-24
CA2101322A1 (en) 1992-08-08
EP0502559A3 (en) 1992-10-14
JP3456993B2 (en) 2003-10-14
EP0570388B1 (en) 1995-05-24
JPH06505343A (en) 1994-06-16
DE69202699D1 (en) 1995-06-29

Similar Documents

Publication Publication Date Title
WO1992014318A1 (en) Method, identification device and verification device for identification and/or performing digital signature
US5625695A (en) Process for generating DSA signatures with low-cost portable apparatuses
JP3433258B2 (en) How to generate a digital signature for smart cards
AU651326B2 (en) Method and system for personal identification using proofs of legitimacy
US5414772A (en) System for improving the digital signature algorithm
US4879747A (en) Method and system for personal identification
EP0191324B1 (en) Offline pin cryptographic validation
CA2196356C (en) Transaction verification protocol for smart cards
US5131039A (en) Optionally moderated transaction systems
CN108833103B (en) Method and system for secure communication between a radio frequency identification tag and a reading device
EP0522473A2 (en) Cryptographic identity verification method and apparatus
WO1997045817A1 (en) System with and method of cryptographically protecting communications
US6003764A (en) Method of securely storing and retrieving monetary data
WO1993009620A1 (en) Method, sender apparatus and receiver apparatus for modulo operation
FR2663141A1 (en) SECRET TRANSFER METHOD BY EXCHANGING TWO CERTIFICATES BETWEEN TWO MICROCALCULATORS RECIPROCALLY AUTHENTICATING THEM.
JP3333503B2 (en) One-time presentation blind sign system
AU1873397A (en) Method of securely storing and retrieving monetary data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BB BG BR CA CS FI HU JP KP KR LK MG MN MW NO PL RO RU SD US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BF BJ CF CG CH CI CM DE DK ES FR GA GB GN GR IT LU MC ML MR NL SE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2101322

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 1992902236

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1992902236

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 08094058

Country of ref document: US

WWG Wipo information: grant in national office

Ref document number: 1992902236

Country of ref document: EP