Hard-Core Bits for Proofs of Knowledge
نویسنده
چکیده
For various well-known proofs of knowledge, we address the problem of how much information a cheating polynomial-time veriier can learn about individual bits of the prover's secret key. Speciically, under the widely believed assumption that the Schnorr identiication protocol is witness hiding, no polynomial-time veriier can distinguish the O(log k) most signiicant bits of the prover's secret key from equally many ips of an unbiased coin, where k is the security parameter that determines the key length. For a minor variation of Schnorr's protocol, not only the O(log k) most signiicant bits are hidden but also O(log k) bits that are close to the least signiicant bits. Similarly, the O(log k) least signiicant bits of the secret key of the prover in the Guillou-Quisquater identiication protocol are unapproximable. All our results hold in the strongest conceivable attack scenario, in that veriiers may engage in arbitrarily many protocol executions and choose new challenges in an adaptive fashion based on information learned in previous protocol executions.
منابع مشابه
Investigating the Evolution of the Political Theory of Imam Khomeini (R.A.) with the Lakatos Methodology Approach
In this article, Imam Khomeini’s political theory is investigated with the Lakatos methodology. His methodology confirms the distinction between a hard core or the original skeleton of investments and experimental propositions confirms as a protective belt for the research program. Regarding this, the claim from this article is that if we understand the system of religious knowledge of Imam Kho...
متن کاملUniversal Hash Functions & Hard Core Bits
In this paper we consider the bit-security of two types of universal hash functions: linear functions on GFF2 n ] and linear functions on the integers modulo a prime. We show individual security for all bits in the rst case and for the O(log n) least signiicant bits in the second case. Both types of functions are shown to have O(log n) simultaneous secure bits. For the second type of functions,...
متن کاملA Hard Convex Core Yukawa Equation of State for Nonassociated Chain Molecules
The compressibility factor of nonassociated chain molecules composed of hard convex core Yukawa segments was derived with SAFT-VR and an extension of the Barker-Henderson perturbation theory for convex bodies. The temperature-dependent chain and dispersion compressibility factors were derived using the Yukawa potential. The effects of temperature, packing fraction, and segment number on the com...
متن کاملOn Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among keys to circumvent security properties. Security against related-key attacks has been a subject of study in numerous recent cryptographic papers. However, most of these results are attacks on specific constructions, whi...
متن کاملOn Computing Minimum Unsatisfiable Cores
Certifying a SAT solver for unsatisfiable instances is a computationally hard problem. Nevertheless, in the utilization of SAT in industrial settings, one often needs to be able to generate unsatisfiability proofs, either to guarantee the correctness of the SAT solver or as part of the utilization of SAT in some applications (e.g. in model checking). As part of the process of generating unsatis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997