2013
DOI: 10.1007/978-3-642-36594-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Public-Coin Concurrent Zero-Knowledge in the Global Hash Model

Abstract: Public-coin zero-knowledge and concurrent zero-knowledge (cZK) are two classes of zero knowledge protocols that guarantee some additional desirable properties. Still, to this date no protocol is known that is both public-coin and cZK for a language outside BPP. Furthermore, it is known that no such protocol can be black-box ZK [Pass et.al, Crypto 09].We present a public-coin concurrent ZK protocol for any NP language. The protocol assumes that all verifiers have access to a globally specified function, drawn f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
47
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(47 citation statements)
references
References 28 publications
0
47
0
Order By: Relevance
“…Our public-coin concurrent ZK protocol is based on the publiccoin concurrent ZK protocol of Canetti, Lin, and Paneth (CLP) [CLP13a], which is secure in the global hash function model. Below, we give a brief overview of our technique under the assumptions that the readers are familiar with Barak's non-black-box simulation technique and the techniques of CLP.…”
Section: Our Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Our public-coin concurrent ZK protocol is based on the publiccoin concurrent ZK protocol of Canetti, Lin, and Paneth (CLP) [CLP13a], which is secure in the global hash function model. Below, we give a brief overview of our technique under the assumptions that the readers are familiar with Barak's non-black-box simulation technique and the techniques of CLP.…”
Section: Our Resultsmentioning
confidence: 99%
“…Because of this problem, the length of the PCP proofs can be rapidly blowing up in the concurrent setting and therefore the size of the simulator cannot be bounded by a polynomial. In [CLP13a], CLP solved this problem in the global hash function model by cleverly using the global hash function in UA.…”
Section: Our Resultsmentioning
confidence: 99%
See 3 more Smart Citations