ZERO-KNOWLEDGE PROOFS FROM SECURE MULTIPARTY COMPUTATION

被引:83
作者
Ishai, Yuval [1 ,2 ]
Kushilevitz, Eyal [1 ]
Ostrovsky, Rafail [2 ,3 ]
Sahai, Amit [2 ,3 ]
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
[3] Univ Calif Los Angeles, Dept Math, Los Angeles, CA 90095 USA
基金
以色列科学基金会; 美国国家科学基金会;
关键词
cryptography; zero-knowledge; secure computation; black-box reductions; COMPLEXITY; PROTOCOL; NP;
D O I
10.1137/080725398
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multiparty computation allows n mutually suspicious players to jointly compute a function of their local inputs without revealing to any t corrupted players additional information beyond the output of the function. We present a new general connection between these two fundamental notions. Specifically, we present a general construction of a zero-knowledge proof for an NP relation R(x, w), which makes only a black-box use of any secure protocol for a related multiparty functionality f. The latter protocol is required only to be secure against a small number of "honest but curious" players. We also present a variant of the basic construction that can leverage security against a large number of malicious players to obtain better efficiency. As an application, one can translate previous results on the efficiency of secure multiparty computation to the domain of zero-knowledge, improving over previous constructions of efficient zero-knowledge proofs. In particular, if verifying R on a witness of length m can be done by a circuit C of size s, and assuming that one-way functions exist, we get the following types of zero-knowledge proof protocols: (1) Approaching the witness length. If C has constant depth over Lambda, V, circle plus, (sic) gates of unbounded fan-in, we get a zero-knowledge proof protocol with communication complexity m . poly(k) . polylog(s), where k is a security parameter. (2) "Constant-rate" zero-knowledge. For an arbitrary circuit C of size s and a bounded fan-in, we get a zero-knowledge protocol with communication complexity O(s) + poly(k, log s). Thus, for large circuits, the ratio between the communication complexity and the circuit size approaches a constant. This improves over the O(ks) complexity of the best previous protocols.
引用
收藏
页码:1121 / 1152
页数:32
相关论文
共 54 条
  • [21] GOLDREICH O, 2004, FDN CRYPTOGRAPHY BAS, DOI DOI 10.1017/CBO9780511721656
  • [22] THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS
    GOLDWASSER, S
    MICALI, S
    RACKOFF, C
    [J]. SIAM JOURNAL ON COMPUTING, 1989, 18 (01) : 186 - 208
  • [23] Goldwasser S, 2008, ACM S THEORY COMPUT, P113
  • [24] Goldwasser Shafi, 1987, STOC, P218, DOI DOI 10.1145/28395.28420
  • [25] Groth J, 2006, LECT NOTES COMPUT SC, V4004, P339
  • [26] Haitner I., 2008, P 5 IACR THEOR CRYPT, P412
  • [27] Haitner I, 2007, ACM S THEORY COMPUT, P1, DOI 10.1145/1250790.1250792
  • [28] Harnik D, 2008, LECT NOTES COMPUT SC, V4948, P393, DOI 10.1007/978-3-540-78524-8_22
  • [29] A pseudorandom generator from any one-way function
    Hästad, J
    Impagliazzo, R
    Levin, LA
    Luby, M
    [J]. SIAM JOURNAL ON COMPUTING, 1999, 28 (04) : 1364 - 1396
  • [30] IMPAGLIAZZO R, 1990, LECT NOTES COMPUT SC, V403, P7