VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME
Kun Peng and Feng Bao
Institute for Infocomm Research, Connexis, Singapore
Keywords:
Attack, Non-membership proof.
Abstract:
An accumulator system used for a special application of anonymous credential is extended by Li et al to a much
wider range of applications: membership proof and non-membership proof. Given a committed secret integer
and a public finite set of prime integers, two proof protocols, membership proof and non-membership proof
are proposed in the extended scheme. The former proves that the integer is in the set when it is really in, while
the latter proves that the integer is not in the set when it is really not in. Although the original accumulator
technique works well in its appointed special application, the extension is insecure and vulnerable to attacks.
Several attacks against membership proof and non-membership proof in the extended work is proposed in this
paper to show its vulnerability in security. The attacks show that an attacker can employ various methods to
give membership proof to an integer not in the set and non-membership proof to an integer in the set.
1 INTRODUCTION
An accumulator system is designed in (Camenisch
and Lysyanskaya, 2002) for application to anonymous
credential. The original design is very efficient and
achieves provable security in its special application.
In (Li et al., 2007), the technique in (Camenisch and
Lysyanskaya, 2002) is generalized and extended to
solve a much more general question: membership
proof and non-membership proof. Membership proof
proves a secret committed integer is in a finite set,
while non-membership proof proves a secret commit-
ted integer is not in a finite set. These two proofs
havea much wider range of applications than the orig-
inal special accumulator system in (Camenisch and
Lysyanskaya, 2002) and are frequently used in vari-
ous cryptographic applications.
In (Li et al., 2007) an accumulator is generated
for the set, which stands for the integers in the set in
a more brief form. For any integer in the set, a mem-
bership witness is generated, which can show mem-
bership of the integer when checked against the ac-
cumulator. When proving membership of an integer,
a prover only needs to show knowledge of the mem-
bership witness in a zero knowledge proof. For any
integer not in the set, a non-membership witness is
generated, which can show non-membership of the
integer when checked against the accumulator. When
proving non-membership of an integer, a prover only
needs to show knowledgeof the non-membership wit-
ness in a zero knowledge proof.
As the original accumulator system (Camenisch
and Lysyanskaya, 2002) works in a special applica-
tion with strict limitations on parameter setting, par-
ticipants’ roles and application environment, the sim-
ple extension (Li et al., 2007) is too wide and not
secure. In this paper, the extended work is demon-
strated to be vulnerable to attacks against its sound-
ness, where soundness of membership proof and non-
membership proof are defined as follows.
Definition 1. (Soundness of membership proof). If a
committed integer is not in the set, the probability that
the prover can pass the verification in the membership
proof protocol is negligible.
Definition 2. (Soundness of non-membership proof).
If a committed integer is in the set, the probability
that the prover can pass the verification in the non-
membership proof protocol is negligible.
In this paper, firstly an attacking algorithm is pro-
posed to employ Euclidean algorithm and the Chi-
nese remainder theorem to extract a secret parame-
ter called φ(n) in (Li et al., 2007). Then four attacks
are designed, two to compromise soundness of mem-
bership proof in (Li et al., 2007) and two to compro-
mise soundness of non-membership proof in (Li et al.,
2007). The attacks show that even if a prover com-
mits to an integer not in the set, he can still pass the
membership proof with a non-negligible probability.
Moreover, using the attacks, even if a prover com-
419
Peng K. and Bao F. (2010).
VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME.
In Proceedings of the International Conference on Security and Cryptography, pages 419-422
DOI: 10.5220/0002912904190422
Copyright
c
SciTePress