Hard-Core Bits for Proofs of Knowledge

نویسنده

  • Stefan Brands
چکیده

For various well-known proofs of knowledge, we address the problem of how much information a cheating polynomial-time veriier can learn about individual bits of the prover's secret key. Speciically, under the widely believed assumption that the Schnorr identiication protocol is witness hiding, no polynomial-time veriier can distinguish the O(log k) most signiicant bits of the prover's secret key from equally many ips of an unbiased coin, where k is the security parameter that determines the key length. For a minor variation of Schnorr's protocol, not only the O(log k) most signiicant bits are hidden but also O(log k) bits that are close to the least signiicant bits. Similarly, the O(log k) least signiicant bits of the secret key of the prover in the Guillou-Quisquater identiication protocol are unapproximable. All our results hold in the strongest conceivable attack scenario, in that veriiers may engage in arbitrarily many protocol executions and choose new challenges in an adaptive fashion based on information learned in previous protocol executions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the Evolution of the Political Theory of Imam Khomeini (R.A.) with the Lakatos Methodology Approach

In this article, Imam Khomeini’s political theory is investigated with the Lakatos methodology. His methodology confirms the distinction between a hard core or the original skeleton of investments and experimental propositions confirms as a protective belt for the research program. Regarding this, the claim from this article is that if we understand the system of religious knowledge of Imam Kho...

متن کامل

Universal Hash Functions & Hard Core Bits

In this paper we consider the bit-security of two types of universal hash functions: linear functions on GFF2 n ] and linear functions on the integers modulo a prime. We show individual security for all bits in the rst case and for the O(log n) least signiicant bits in the second case. Both types of functions are shown to have O(log n) simultaneous secure bits. For the second type of functions,...

متن کامل

A Hard Convex Core Yukawa Equation of State for Nonassociated Chain Molecules

The compressibility factor of nonassociated chain molecules composed of hard convex core Yukawa segments was derived with SAFT-VR and an extension of the Barker-Henderson perturbation theory for convex bodies. The temperature-dependent chain and dispersion compressibility factors were derived using the Yukawa potential. The effects of temperature, packing fraction, and segment number on the com...

متن کامل

On Related-Secret Pseudorandomness

Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among keys to circumvent security properties. Security against related-key attacks has been a subject of study in numerous recent cryptographic papers. However, most of these results are attacks on specific constructions, whi...

متن کامل

On Computing Minimum Unsatisfiable Cores

Certifying a SAT solver for unsatisfiable instances is a computationally hard problem. Nevertheless, in the utilization of SAT in industrial settings, one often needs to be able to generate unsatisfiability proofs, either to guarantee the correctness of the SAT solver or as part of the utilization of SAT in some applications (e.g. in model checking). As part of the process of generating unsatis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997