Subversion-Resistant Simulation (Knowledge) Sound NIZKs

作者: Karim Baghery

DOI: 10.1007/978-3-030-35199-1_3

关键词: Mathematical proofConstructed languageArgumentConstruct (python library)SoundnessThird partySNARK (theorem prover)SubversionComputer scienceTheoretical computer science

摘要: In ASIACRYPT 2016, Bellare, Fuchsbauer and Scafuro studied security of non-interactive zero-knowledge (NIZK) arguments in the face parameter subversion. They showed that achieving subversion soundness (soundness without trusting to third party) standard is impossible at same time. On positive side, best case, they one can achieve (zero-knowledge this paper, we show amplify their result construct NIZK simulation (knowledge) Simulation a stronger notion comparison with soundness, as it also guarantees non-malleability proofs. Such guarantee must practical systems. To prove result, given argument achieves Sub-ZK use an OR-based construction define new language build will We instantiate state-of-the-art zk-SNARK proposed by Groth [Eurocrypt 2016] obtain efficient SNARK knowledge soundness.

参考文章(32)
Karim Baghery, On the Efficiency of Privacy-Preserving Smart Contract Systems international conference on cryptology in africa. pp. 118- 136 ,(2019) , 10.1007/978-3-030-23696-0_7
Karim Baghery, Subversion-Resistant Commitment Schemes: Definitions and Constructions. IACR Cryptology ePrint Archive. ,vol. 2019, pp. 1065- ,(2019)
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras, Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE IACR Transactions on Symmetric Cryptology. ,vol. 2019, pp. 119- 146 ,(2020) , 10.46586/TOSC.V2019.I4.119-146
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając, On QA-NIZK in the BPK Model public key cryptography. ,vol. 2018, pp. 590- 620 ,(2018) , 10.1007/978-3-030-45374-9_20
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova, Quadratic Span Programs and Succinct NIZKs without PCPs theory and application of cryptographic techniques. pp. 626- 645 ,(2013) , 10.1007/978-3-642-38348-9_37
Silvio Micali, Paul Feldman, Manuel Blum, Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) symposium on the theory of computing. pp. 103- 112 ,(1988)
Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway, Security of Symmetric Encryption against Mass Surveillance international cryptology conference. ,vol. 2014, pp. 1- 19 ,(2014) , 10.1007/978-3-662-44371-2_1
Jens Groth, Rafail Ostrovsky, Amit Sahai, Non-interactive Zaps and New Techniques for NIZK Lecture Notes in Computer Science. pp. 97- 111 ,(2006) , 10.1007/11818175_6
Ivan Damgård, Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks international cryptology conference. pp. 445- 456 ,(1991) , 10.1007/3-540-46766-1_36