2010
DOI: 10.1007/978-3-642-14165-2_59
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Knowledge Extraction in the Public-Key Model

Abstract: Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the internal state of protocol players without ever looking at this supposedly secret state. However, when transactions are concurrent (e.g., over the Internet) with players possessing public-keys (as is common in cryptography), assuring that entities "know" what the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(16 citation statements)
references
References 46 publications
0
16
0
Order By: Relevance
“…In this paper we show subtle problems concerning security proofs of various cZK and rZK arguments in the BPK model [18,32,7,9,27,31,6,29], including all round-optimal constructions published so far.…”
Section: Our Results and Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…In this paper we show subtle problems concerning security proofs of various cZK and rZK arguments in the BPK model [18,32,7,9,27,31,6,29], including all round-optimal constructions published so far.…”
Section: Our Results and Techniquesmentioning
confidence: 99%
“…We have given details to explain the problem with the simulation of Π MR , and under minor variations, all other results [18,32,7,9,27,31,6,29] suffer of similar problems. We will now focus on protocols that however could have a different simulation.…”
Section: The Case Of π Mrmentioning
confidence: 99%
See 2 more Smart Citations
“…The bare public key model was proposed in [5] where, before any interaction starts, every player is required to declare a public key and store it in a public file (which never changes once the sessions start). In this model it is known how to obtain constant-round concurrent zero knowledge with concurrent soundness under standard assumptions [13,35,36,34]. This model has also been used for constant-round concurrent non-malleable zero knowledge [25] and various constant-round resettable and simultaneously resettable protocols [22,39,11,9,10,38,37,7].…”
Section: Related Workmentioning
confidence: 99%