Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles

被引:39
作者
Gradwohl, Ronen [2 ]
Naor, Moni [2 ]
Pinkas, Benny [1 ]
Rothblum, Guy N. [3 ]
机构
[1] Univ Haifa, Dept Comp Sci, IL-31999 Haifa, Israel
[2] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[3] MIT, CSAIL, Cambridge, MA 02139 USA
基金
以色列科学基金会; 美国国家科学基金会;
关键词
Cryptography; Zero-knowledge proofs; Puzzles; PROTOCOLS;
D O I
10.1007/s00224-008-9119-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle, without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the verifier. In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature. In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just simple playing cards. The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols are meant to be understood by "lay-people" and implementable without the use of computers.
引用
收藏
页码:245 / 268
页数:24
相关论文
共 21 条
[1]  
[Anonymous], 2001, FDN CRYPTOGRAPHY BAS, DOI DOI 10.1017/CBO9780511546891
[2]  
Aumann Y, 2007, LECT NOTES COMPUT SC, V4392, P137
[3]   Private computation using a PEZ dispenser [J].
Balogh, J ;
Csirik, JA ;
Ishai, Y ;
Kushilevitz, E .
THEORETICAL COMPUTER SCIENCE, 2003, 306 (1-3) :69-84
[4]  
Blum M., 1986, INT C MATH, V2, P1444
[5]  
Crpeau C., 1994, Advances in CryptologyCRYPTO 93, P319, DOI [DOI 10.1007/3-540-48329-2_27, 10.1007/3-540-48329-227, DOI 10.1007/3-540-48329-227]
[6]   Comparing information without leaking it [J].
Fagin, R ;
Naor, M ;
Winkler, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (05) :77-85
[7]  
GOLDREICH O, 1991, J ACM, V38, P691, DOI 10.1145/116825.116852
[8]  
Goldreich O, 1998, MODERN CRYPTOGRAPHY, V17
[9]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[10]   Unwed numbers [J].
Hayes, B .
AMERICAN SCIENTIST, 2006, 94 (01) :12-15