Skip to main content

Zero-knowledge proofs

IRMA uses zero-knowledge proofs to prove that a number satisfies a certain property, without disclosing the number itself, in various situations. In particular:

  • When a user discloses part of the attributes of a credential, she hides the others using a zero-knowledge proof, with which she convinces the verifier that she possesses a valid issuer signature over all attributes from the credential, including the hidden ones.
  • The user always uses the same number - her secret key - as the first attribute of each credential she receives, by proving to the issuer that she knows the number, without disclosing it to the issuer. This way the issuer can safely sign this attribute (together with the other ones) without knowing it.

Here we briefly review how zero-knowledge proofs are used in IRMA. We take the following:

  • Let GG be a (multiplicatively written) cyclic group. In Idemix which IRMA implements, this is G=QR(n)G = QR(n), the subgroup of quadratic residues in the integers modulo nn, with n=pqn = p q a product of safe primes.
  • Let RR be a generator of GG - that is, any element PP from GG can be written as P=RmP = R^m for some integer (attribute) mm. (Such a generator always exists because GG is cyclic.)

Now suppose that RR and PP are known, and the (IRMA) user wishes to convince someone (the verifier) that she knows the number mm which is such that P=RmP = R^m. IRMA uses zero-knowledge proofs in the Fiat-Shamir heuristic for this. Skipping many details, the following happens:

  1. The verifier sends a random number η\eta called the nonce to the user.
  2. The user:
    1. generates a random number ww
    2. computes the commitment W=RwW = R^w,
    3. computes the challenge c=H(P,W,η)c = H(P, W, \eta), where HH is a hash function (e.g., SHA256)
    4. computes the response s=cm+ws = cm + w,
    5. sends the tuple (c,s)(c, s) to the verifier.
  3. The verifier computes W=RsPcW' = R^sP^{-c} and c=H(P,W,η)c' = H(P, W', \eta), and then verifies that c=cc = c'.

If cc and ss are correctly computed, then W=RsPc=Rcm+wRmc=Rw=WW' = R^sP^{-c} = R^{cm+w}R^{-mc} = R^w = W, so that the verification equation c=H(P,W,η)=H(P,W,η)=cc' = H(P, W', \eta) = H(P, W, \eta) = c indeed holds. Additionally, when correctly implemented this protocol guarantees the following:

  • The user indeed knows mm (more precisely: if the user does not know the number mm then it cannot make the verifier accept),
  • The verifier learns nothing about the value or properties of mm that it did not already know, except that it is known to the user.

The actual zero-knowledge proof protocol implemented in IRMA allows for simultaneous proving knowledge of multiple hidden numbers, instead of just the one mm like the protocol above. This extension is essentially straightforward and not relevant here.

Due to the fact that the order of the group QR(n)QR(n) in which the proofs take place is not known to all participants (in fact, this group order is the IRMA issuer's secret key), the proofs of knowledge in IRMA are slightly more complicated than they would be if the group order were known (such as for example in elliptic curves). For example, if the group order were known then the response s=cm+ws = cm + w from step 2.4 above would be reduced modulo the group order. Instead in IRMA we have to choose ww to be very large so that even without this modular reduction it still completely hides mm. For full details about proofs of knowledge in this situation, we refer to Appendix C of the Identity Mixer specification.