Augmented Black-Box Simulation and Zero Knowledge Argument for NP

نویسندگان

  • Hongda Li
  • Dongxue Pan
  • Peifang Ni
چکیده

The standard zero knowledge notion is formalized by requiring that for any probabilistic polynomial-time (PPT) verifier V ∗, there is a PPT algorithm (simulator) SV ∗ , such that the outputs of SV ∗ is indistinguishable from real protocol views. The simulator is not permitted to access the verifier V ∗’s private state. So the power of SV ∗ is, in fact, inferior to that of V ∗. In this paper, a new simulation method, called augmented black-box simulation, is presented by permitting the simulator to have access to the verifier’s current private state in a special manner. The augmented black-box simulator only has the same computing power as the verifier although it is given access to the verifier’s current private state. Therefore, augmented black-box simulation is a reasonable method to prove zero knowledge property, and brings results that hard to obtain with previous simulation techniques. Zero knowledge property, proved by means of augmented black-box simulation, is called augmented black-box zeroknowledge. We present a 5-round statistical augmented black-box zero-knowledge argument for Exact Cover Problem under the Decision Multilinear No-Exact-Cover Assumption. In addition, we show a 2-round computational augmented black-box zero-knowledge argument protocol for Exact Cover problem under the Decision Multilinear No-Exact-Cover Assumption and the assumption of the existence of hash functions. It is well known that 2-round zero knowledge protocols does not exist under general zero knowledge notion. Besides, following [19], we consider leakage-resilient property of augmented black-box zero knowledge, and prove that the presented statistical zero-knowledge protocol has optimal leakageresilient property. Key word: zero-knowledge proofs (arguments), black-box simulation, constantround, Exact-Cover problem, leakage-resilient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zero Knowledge and Soundness Are Symmetric

We give a complexity-theoretic characterization of the class of problems in NP having zeroknowledge argument systems. This characterization is symmetric in its treatment of the zero knowledge and the soundness conditions, and thus we deduce that the class of problems in NP ∩ coNP having zero-knowledge arguments is closed under complement. Furthermore, we show that a problem in NP has a statisti...

متن کامل

Resettably-Sound Resettable Zero Knowledge Arguments for NP

We construct resettably-sound resettable zero knowledge arguments for NP based on standard hardness assumption (the existence of claw-free permutations) in the plain model. This proves the simultaneous resettability conjecture posed by Barak et al. in [FOCS 2001]. Our construction, inspired by the paradigm for designing concurrent zero knowledge protocols, makes crucial use of a tool called ins...

متن کامل

Resettably-Sound Zero-Knowledge and its Applications

Resettably-sound proofs and arguments remain sound even when the prover can reset the verifier, and so force it to use the same random coins in repeated executions of the protocol. We show that resettably-sound zero-knowledge arguments for NP exist if collision-resistant hash functions exist. In contrast, resettably-sound zero-knowledge proofs are possible only for languages in P/poly. We prese...

متن کامل

Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds

We show that any concurrent zero-knowledge protocol for a non-trivial language (i.e., for a language outside BPP), whose security is proven via black-box simulation, must use at least ~ (log n) rounds of interaction. This result achieves a substantial improvement over previous lower bounds, and is the rst bound to rule out the possibility of constant-round concurrent zero-knowledge when proven ...

متن کامل

Resettable Zero-Knowledge in the Weak Public-Key Model

A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upperbounded public-key (UPK) model introduced by Micali and Reyzin [EuroCrypt’01, pp. 373–393], is introduced and is named weak public-key (WPK) model. The motivations and applications of the WPK model are justified in the distributed smart-card/server setting and it seems more...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017