2018
DOI: 10.1007/978-3-319-76581-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Compact Zero-Knowledge Proofs of Small Hamming Weight

Abstract: We introduce a new technique that allows to give a zeroknowledge proof that a committed vector has Hamming weight bounded by a given constant. The proof has unconditional soundness and is very compact: It has size independent of the length of the committed string, and for large fields, it has size corresponding to a constant number of commitments. We show five applications of the technique that play on a common theme, namely that our proof allows us to get malicious security at small overhead compared to semi-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…The first efficient non-interactive zero-knowledge proof for proving that a mix shuffled correctly is proposed in [19]. A description of how the permutation used by a mix can be constructed by multiple parties is given in [10].…”
Section: A Approaches With Additional (Neutral) Instancesmentioning
confidence: 99%
See 1 more Smart Citation
“…The first efficient non-interactive zero-knowledge proof for proving that a mix shuffled correctly is proposed in [19]. A description of how the permutation used by a mix can be constructed by multiple parties is given in [10].…”
Section: A Approaches With Additional (Neutral) Instancesmentioning
confidence: 99%
“…These rerandomized ciphertexts E ′ 1 (x ′ ρi ) form sequence X = (..., E ′ 1 (x ′ ρi ), ...). From ( 9), (10), and (11), it follows that these ciphertexts encrypt the same plaintexts as the ciphertexts E 1 (x ′ ρi ) ∈ X ′ and therefore also the same plaintexts as the ciphertexts E 1 (x i ) ∈ X. From (10), it follows that the rerandomized ciphertexts E ′ 1 (x i ) ∈ X and the non-rerandomized ciphertexts E 1 (x i ) ∈ X that encrypt the same secret input x i are different from each other, i.e., E ′…”
Section: B Distinct Ciphertextsmentioning
confidence: 99%