A New Approach to Efficient Non-Malleable Zero-Knowledge

被引:3
作者
Kim, Allen [1 ]
Liang, Xiao [1 ]
Pandey, Omkant [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV | 2022年 / 13510卷
基金
美国国家科学基金会;
关键词
Non-malleability; Efficiency; Symmetric assumptions; COMMITMENTS; SIMULATION; ARGUMENTS; PROTOCOLS; SECURITY; TIME;
D O I
10.1007/978-3-031-15985-5_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-malleable zero-knowledge, originally introduced in the context of man-in-the-middle attacks, serves as an important building block to protect against concurrent attacks where different protocols may coexist and interleave. While this primitive admits almost optimal constructions in the plain model, they are several orders of magnitude slower in practice than standalone zero-knowledge. This is in sharp contrast to non-malleable commitments where practical constructions (under the DDH assumption) have been known for a while. We present a new approach for constructing efficient non-malleable zero-knowledge for all languages in NP, based on a new primitive called instance-based non-malleable commitment (IB-NMC). We show how to construct practical IB-NMC by leveraging the fact that simulators of sub-linear zero-knowledge protocols can be much faster than the honest prover algorithm. With an efficient implementation of IB-NMC, our approach yields the first general-purpose non-malleable zero-knowledge protocol that achieves practical efficiency in the plain model. All of our protocols can be instantiated from symmetric primitives such as block-ciphers and collision-resistant hash functions, have reasonable efficiency in practice, and are general-purpose. Our techniques also yield the first efficient non-malleable commitment scheme without public-key assumptions.
引用
收藏
页码:389 / 418
页数:30
相关论文
共 81 条
[1]   Non-malleable Codes from Additive Combinatorics [J].
Aggarwal, Divesh ;
Dodis, Yevgeniy ;
Lovett, Shachar .
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, :774-783
[2]   Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [J].
Ames, Scott ;
Hazay, Carmit ;
Ishai, Yuval ;
Venkitasubramaniam, Muthuramakrishnan .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2087-2104
[3]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]   Promise Zero Knowledge and Its Applications to Round Optimal MPC [J].
Badrinarayanan, Saikrishna ;
Goyal, Vipul ;
Jain, Abhishek ;
Kalai, Yael Tauman ;
Khurana, Dakshita ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :459-487
[5]  
Barak B, 2002, ANN IEEE SYMP FOUND, P345, DOI 10.1109/SFCS.2002.1181957
[6]   How to go beyond the black-box simulation barrier [J].
Barak, B .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :106-115
[7]  
Barak B, 2006, ANN IEEE SYMP FOUND, P345
[8]   UNIVERSAL ARGUMENTS AND THEIR APPLICATIONS [J].
Barak, Boaz ;
Goldreich, Oded .
SIAM JOURNAL ON COMPUTING, 2008, 38 (05) :1661-1694
[9]  
Barin S., 2022, ENG SCI TECHNOL INT, V34, P101174, DOI [10.3390/biophysica2030025, 10.1016/j.jestch.2022.101174]
[10]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62, DOI [10.1145/168588.168596, DOI 10.1145/168588.168596]