2012
DOI: 10.1007/978-3-642-29011-4_11
|View full text |Cite
|
Sign up to set email alerts
|

On Round-Optimal Zero Knowledge in the Bare Public-Key Model

Abstract: Abstract. In this paper we revisit previous work in the BPK model and point out subtle problems concerning security proofs of concurrent and resettable zero knowledge (cZK and rZK, for short). Our analysis shows that the cZK and rZK simulations proposed for previous (in particular all round-optimal) protocols are distinguishable from real executions. Therefore some of the questions about achieving round optimal cZK and rZK in the BPK model are still open. We then show our main protocol, ΠcZK, that is a round-o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
11
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 31 publications
1
11
0
Order By: Relevance
“…The issue here is that, such simulation strategy does not apply to the selective opening setting where multiple sessions are played in parallel with possibly different abort probabilities. Similar issues have been pointed out in [22] on previous work on round-optimal concurrent zero knowledge with bare public keys. The same issue on simulatability holds for the (t + 3, 1)-round scheme.…”
Section: (33)-round Scheme From One-way Permutationssupporting
confidence: 73%
“…The issue here is that, such simulation strategy does not apply to the selective opening setting where multiple sessions are played in parallel with possibly different abort probabilities. Similar issues have been pointed out in [22] on previous work on round-optimal concurrent zero knowledge with bare public keys. The same issue on simulatability holds for the (t + 3, 1)-round scheme.…”
Section: (33)-round Scheme From One-way Permutationssupporting
confidence: 73%
“…The bare public key model was proposed in [5] where, before any interaction starts, every player is required to declare a public key and store it in a public file (which never changes once the sessions start). In this model it is known how to obtain constant-round concurrent zero knowledge with concurrent soundness under standard assumptions [13,35,36,34]. This model has also been used for constant-round concurrent non-malleable zero knowledge [25] and various constant-round resettable and simultaneously resettable protocols [22,39,11,9,10,38,37,7].…”
Section: Related Workmentioning
confidence: 99%
“…The security provided by the SHVZK property is clearly insufficient as it gives no immediate guarantees against verifiers who deviates from the protocol. Despite of this, the success of Σ-protocols and their impact in various constructions [1,2,6,[9][10][11][12]14,15,20,22,25,27,32,33,36,37,40,41,43] is a fact. This is due to a breakthrough of Cramer et al [18] that adds WI to the security of Σ-protocol.…”
Section: Introductionmentioning
confidence: 99%