Predictable Arguments of Knowledge

نویسندگان

  • Antonio Faonio
  • Jesper Buus Nielsen
  • Daniele Venturi
چکیده

We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answers of the prover can be predicted, given the private randomness of the verifier. We show that predictable arguments of knowledge (PAoK) can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (two messages) without loss of generality. We then explore constructs of PAoK. For specific relations we obtain PAoK from Extractable Hash Proof systems (Wee, Crypto ’10); we also show that PAoK are equivalent to Extractable Witness Encryption. Unfortunately, the latter poses serious doubts on the existence of PAoK for all NP. However, we show that for the class of random self-reducible problems in NP we can avoid the problem relying on the assumption of public-coin differing-inputs obfuscation (Ishai et al., TCC ’15). Finally, we apply PAoK in the context of leakage-tolerant PKE protocols. At PKC ’13 Nielsen et al. have shown that any leakage-tolerant PKE protocol requires long keys already when it tolerates super-logarithmic leakage. We strengthen their result proving a more fine-grained lower bound for any constant numbers bits of leakage. ∗Electronic Addresses: {antfa,jbn}@cs.au.dk †Electronic Address: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

یافتن الگوهای مکرّر در قرآن کریم به‌‌کمک روش‌‌های متن‌‌کاوی

Quran’s Text differs from any other texts in terms of its exceptional concepts, ideas and subjects. To recognize the valuable implicit patterns through a vast amount of data has lately captured the attention of so many researchers. Text Mining provides the grounds to extract information from texts and it can help us reach our objective in this regard. In recent years, Text Mining on Quran and e...

متن کامل

Social Media and Politics: Examining Indonesians’ Political Knowledge on Facebook

The Internet and social media have played a significant role in contemporarypolitical sphere of Indonesia. In particular, they have been widely usedfor political activism and discussion; but whether the discussions areconstructive is another issue. Constructive political discussion requiresseveral preconditions; one of the most important requirements is rationalreasoning. Citizens must be equip...

متن کامل

Knowledge, Politics and Power in Global Health; Comment on “Knowledge, Moral Claims and the Exercise of Power in Global Health”

This article agrees with recent arguments suggesting that normative and epistemic power is rife within global health policy and provides further examples of such. However, in doing so, it is argued that it is equally important to recognize that global health is, and always will be, deeply political and that some form of power is not only necessary for the system to advance, but also to try and ...

متن کامل

Funds of Knowledge: An Underrated Tool for School Literacy and Student Engagement

This chief aim of this paper is to explore the concept of Funds of Knowledge (FOK) in relation to Cultural Historical Activity Theory (CHAT). This study unveils the basic tenets of FOK from the lens of activity theory and analyzes pertinent discoveries, key concepts, and scholars’ arguments relating to FOK and literacy development over time. The major purpose of this study is to expand the pers...

متن کامل

The ecosystem of knowledge-based development” and employment of higher education graduates

The employment of higher education graduates (EHEG) in Iran is not desirable. Policymakers and executives of economic programs attribute this to the oversupply and poor quality of university graduates.  On the other hand, policymakers and implementers of higher education programs attribute this to the low demand of the Iranian economy for higher education graduates. Although both arguments are ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015