Lecture Notes in Computer Science
DOI: 10.1007/3-540-48658-5_19
|View full text |Cite
|
Sign up to set email alerts
|

Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols

Abstract: Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S on n participants. Then under certain assumptions on P and S, we show how to transform P into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to a subset of n problem instances corresponding to a qualified set of participants. For example, using a threshold scheme, the prover can show… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
675
0
2

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 836 publications
(702 citation statements)
references
References 12 publications
1
675
0
2
Order By: Relevance
“…We show that every predicate has a commital deniable proof, using techniques of Cramer et al [13,12]. That is, we show that the protocol from [12] has our new property of commital deniability.…”
Section: Commital Deniable Proofsmentioning
confidence: 77%
See 1 more Smart Citation
“…We show that every predicate has a commital deniable proof, using techniques of Cramer et al [13,12]. That is, we show that the protocol from [12] has our new property of commital deniability.…”
Section: Commital Deniable Proofsmentioning
confidence: 77%
“…This fairly general construction seems to be applicable in many situations in which provability and deniability should be combined. Our protocol builds on ideas of Cramer and Damgard [12] for efficient zero-knowledge proofs, which in turn builds on ideas of Cramer, Damgard, and Schoenmakers [13]. In essence, we show that these earlier protocols have our new property of commital deniability.…”
Section: Introductionmentioning
confidence: 89%
“…Our two-party decryption system in Section 5 uses special types of Σ-protocols to deal with malicious adversaries, so here we overview the basic definitions and properties of Σ-protocols [14,13]. (This section may be skipped if one is only interested in the high-level design of our two-party decryption system, and in particular, a design that is only secure against so-called "honest-but-curious" adversaries.…”
Section: Definition and Basic Theory Of σ-Protocolsmentioning
confidence: 99%
“…A simple but important fact (see [14]) is that if a Σ-protocol is HVZK, the protocol is perfectly witness indistinguishable (WI) [22]. Although HVZK by itself is defined with respect to a very much restricted verifier, i.e.…”
Section: Philip Mackenziementioning
confidence: 99%
“…It is very attractive to use in these protocols the non-interactive OT 2 1 protocols of Bellare and Micali [1]. The combination of these protocols with the proof techniques of [9] yields a very efficient OT 2 1 protocol which is based on the Decisional Diffie-Hellman assumption.…”
Section: The Decisional Diffie-hellman Assumptionmentioning
confidence: 99%