Fine-Tuning Groth-Sahai Proofs

作者: Alex Escala , Jens Groth

DOI: 10.1007/978-3-642-54631-0_36

关键词:

摘要: Groth-Sahai proofs are efficient non-interactive zero-knowledge that have found widespread use in pairing-based cryptography. We propose efficiency improvements of the SXDH setting, which is one yields most proofs. We replace some commitments with ElGamal encryptions, reduces prover's computation and for types equations proof size.Groth-Sahai when no public elements paired to each other. observe they also base groups constants.The can be reduced by letting her pick own common reference string. By giving a she has picked valid string this does not compromise soundness.We define type-based commit-and-prove scheme, allows reused many different proofs.

参考文章(32)
Charanjit S. Jutla, Arnab Roy, Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces international cryptology conference. pp. 1- 20 ,(2013) , 10.1007/978-3-642-42033-7_1
Ivan Damgård, Non-interactive circuit based proofs and non-interactive perfect zero-knowledge with preprocessing theory and application of cryptographic techniques. pp. 341- 355 ,(1992) , 10.1007/3-540-47555-9_28
Xavier Boyen, Brent Waters, Compact Group Signatures Without Random Oracles Advances in Cryptology - EUROCRYPT 2006. pp. 427- 444 ,(2006) , 10.1007/11761679_26
Georg Fuchsbauer, David Pointcheval, Damien Vergnaud, Transferable Constant-Size Fair E-Cash cryptology and network security. ,vol. 5888, pp. 226- 247 ,(2009) , 10.1007/978-3-642-10433-6_15
Olivier Blazy, Amandine Jambert, Damien Vergnaud, Georg Fuchsbauer, Malika Izabachène, Hervé Sibert, Batch Groth-Sahai applied cryptography and network security. ,vol. 6123, pp. 218- 235 ,(2010) , 10.1007/978-3-642-13708-14
Jens Groth, Simulation-sound NIZK proofs for a practical language and constant size group signatures international conference on the theory and application of cryptology and information security. pp. 444- 459 ,(2006) , 10.1007/11935230_29
Essam Ghadafi, Nigel. P. Smart, Bogdan Warinschi, Groth–Sahai proofs revisited public key cryptography. pp. 177- 192 ,(2010) , 10.1007/978-3-642-13013-7_11
Georg Fuchsbauer, Commuting signatures and verifiable encryption international cryptology conference. pp. 224- 245 ,(2011) , 10.1007/978-3-642-20465-4_14
Jens Groth, Fully anonymous group signatures without random oracles international conference on the theory and application of cryptology and information security. pp. 164- 180 ,(2007) , 10.1007/978-3-540-76900-2_10
Jae Hong Seo, On the (Im)possibility of Projecting Property in Prime-Order Setting Advances in Cryptology – ASIACRYPT 2012. pp. 61- 79 ,(2012) , 10.1007/978-3-642-34961-4_6