Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity

2020 ◽  
Author(s):  
Zhenbin Yan ◽  
Yi Deng

Abstract Round complexity is one of the fundamental problems in zero-knowledge (ZK) proof systems. Non-malleable zero-knowledge (NMZK) protocols are ZK protocols that provide security even when man-in-the-middle adversaries interact with a prover and a verifier simultaneously. It is known that the first constant-round public-coin NMZK arguments for NP can be constructed by assuming the existence of collision-resistant hash functions (Pass, R. and Rosen, A. (2005) New and Improved Constructions of Non-Malleable Cryptographic Protocols. In Gabow, H.N. and Fagin, R. (eds) Proc. 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 2224, 2005, pp. 533542. ACM) and has relatively high round complexity; the first four-round private-coin NMZK arguments for NP can be constructed in the plain model by assuming the existence of one-way functions (Goyal, V., Richelson, S., Rosen, A. and Vald, M. (2014) An Algebraic Approach to Non-Malleability. In 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 1821, 2014, pp. 4150. IEEE Computer Society and Ciampi, M., Ostrovsky, R., Siniscalchi, L. and Visconti, I. (2017) Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds. In Kalai, Y. and Reyzin, L. (eds) Theory of Cryptography15th Int. Conf., TCC 2017. Lecture Notes in Computer Science, Baltimore, MD, USA, November 1215, 2017, Part I, Vol. 10677, pp. 711742. Springer). In this paper, we present a six-round public-coin NMZK argument of knowledge system assuming the existence of collision-resistant hash functions and a three-round private-coin NMZK argument system from multi-collision resistance of hash functions assumption in the keyless setting.

1994 ◽  
Vol 1 (28) ◽  
Author(s):  
Oded Goldreich

Various types of <em>probabilistic</em> proof systems have played a central role in the development of computer science in the last decade. In this exposition, we concentrate on three such proof systems -- <em>interactive proofs</em>, <em>zero-knowledge proofs</em>, and <em>probabilistic checkable proofs</em> -- stressing the essential role of randomness in each of them.<br /> <br />This exposition is an expanded version of a survey written for the proceedings of the International Congress of Mathematicians (<em>ICM94</em>) held in Zurich in 1994. It is hope that this exposition may be accessible to a broad audience of computer scientists and mathematians.


1996 ◽  
Vol 9 (3) ◽  
pp. 167-189 ◽  
Author(s):  
Oded Goldreich ◽  
Ariel Kahan

1994 ◽  
Vol 1 (39) ◽  
Author(s):  
Ivan B. Damgård ◽  
Oded Goldreich ◽  
Avi Wigderson

In <em>Crypto93</em>, Damgård showed that any constant-round protocol in which the verifier sends only independent, random bits and which is zero-knowledge against the <em>honest</em> verifier can be transformed into a protocol (for the same problem) that is zero-knowledge <em>in general</em>. His transformation was based on the interactive hashing technique of Naor, Ostrovsky, Venkatesan and Yung, and thus the resulting protocol had very large round-complexity.


Author(s):  
S. Dov Gordon ◽  
Hoeteck Wee ◽  
David Xiao ◽  
Arkady Yerukhimovich

2020 ◽  
Vol 17 (6) ◽  
pp. 2435-2440
Author(s):  
Arvind K. Sharma ◽  
S. K. Mittal

Cryptography is a branch of Computer-Science which fully devotes towards further enhancements or innovations of various applications concern to information security i.e., to manage Confidentiality/ Integrity of resources. Confidentiality of resources most probably look after by ‘Encryption–Decryption’ techniques like ‘DES,’ ‘AES,’ ‘Blowfish,’ ‘Two-Fish,’ etc., were as ‘Integrity’ managed by Hash Functions, which have a distinct paramount significance in Network-Security/Computer- Security/Internet-Security. Both the ‘Integrity’ of data and ‘Authenticity’ of resource proved with the help of digest generated by the Hash algorithm. There are several hash algorithms available to provide distinct security, depends on how hard is to break it and pre-defined resource utilization (time/space). Some well-known names are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav, etc. In this article, we are focusing on vulnerabilities in the Merkle- Damgard scheme for constructing Hash-Functions with suitable implementation of MD5.


2019 ◽  
Vol 54 (6) ◽  
Author(s):  
Israa Ezzat Salem ◽  
Adil M. Salman ◽  
Maad M. Mijwil

The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is common and used for various purposes such as File Integrity Verification, Key Derivation, Time stamping, Password Hashing, Rootkit Detection and Digital Signature. Digital Signature is a code that is linked electronically with the document including the sender's identity. Therefore, the digital signature is of high value in verifying digital messages or documents. Cryptographic hash functions do not present without mathematics. The success of computer science is attributed to mathematics; in other words, it is because of mathematical science, that computer science was understood and could be explained to all. The study aims to teach the reader hash functions and its applications such as digital signature and to show in details some hash functions and their designing.


Author(s):  
Michele Ciampi ◽  
Rafail Ostrovsky ◽  
Luisa Siniscalchi ◽  
Ivan Visconti
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document