Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting

被引:16
作者
Benhamouda, Fabrice
Couteau, Geoffroy
Pointcheval, David [1 ]
Wee, Hoeteck
机构
[1] ENS, F-75230 Paris 05, France
来源
ADVANCES IN CRYPTOLOGY, PT II | 2015年 / 9216卷
关键词
Hash proof systems; Zero-knowledge; Malicious adversaries; Two-party computation; Inner product; SECURE 2-PARTY COMPUTATION; EFFICIENT; IDENTIFICATION; METHODOLOGY; ENCRYPTION; PROTOCOL; PROOFS; PROVE;
D O I
10.1007/978-3-662-48000-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce implicit zero-knowledge arguments (iZK) and simulation-sound variants thereof (SSiZK); these are lightweight alternatives to zero-knowledge arguments for enforcing semi-honest behavior. Our main technical contribution is a construction of efficient two-flow iZK and SSiZK protocols for a large class of languages under the (plain) DDH assumption in cyclic groups in the common reference string model. As an application of iZK, we improve upon the round-efficiency of existing protocols for securely computing inner product under the DDH assumption. This new protocol in turn provides privacy-preserving biometric authentication with lower latency.
引用
收藏
页码:107 / 129
页数:23
相关论文
共 45 条
[1]  
Abdalla M., 2014, 2014483 CRYPT EPRINT
[2]  
Abdalla M, 2013, LECT NOTES COMPUT SC, V8269, P214, DOI 10.1007/978-3-642-42033-7_12
[3]  
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[4]  
[Anonymous], 1990, FOCS 1990
[5]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[6]  
[Anonymous], 1991, 23 ACM STOC
[7]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[8]  
Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
[9]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P171
[10]  
Benhamouda F, 2015, 2015246 CRYPT EPRINT