An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
نویسنده
چکیده
We give a new proof of the existence of public-coin concurrent zero-knowledge arguments for NP in the plain model under standard assumptions (the existence of one-to-one one-way functions and collision-resistant hash functions), which was originally proven by Goyal (STOC’13). In the proof, we use a new variant of the non-black-box simulation technique of Barak (FOCS’01). An important property of our simulation technique is that the simulator runs in a straight-line manner in the fully concurrent setting. Compared with the simulation technique of Goyal, which also has such a property, the analysis of our simulation technique is (arguably) simpler. ∗This article is a minor revision of the version that appears in the proceedings of TCC 2015.
منابع مشابه
Concurrent Secure Computation via Non-Black Box Simulation
Recently, Goyal (STOC’13) proposed a new non-black box simulation techniques for fully concurrent zero knowledge with straightline simulation. Unfortunately, so far this technique is limited to the setting of concurrent zero knowledge. The goal of this paper is to study what can be achieved in the setting of concurrent secure computation using non-black box simulation techniques, building upon ...
متن کاملBeyond the Black Box Approach to Ethics!; Comment on “Expanded HTA: Enhancing Fairness and Legitimacy”
In the editorial published in this journal, Daniels and colleagues argue that his and Sabin’s accountability for reasonableness (A4R) framework should be used to handle ethical issues in the health technology assessment (HTA)-process, especially concerning fairness. In contrast to this suggestion, it is argued that such an approach risks suffering from the irrrelevance or insufficiency they war...
متن کاملBlack-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds
We show that any concurrent zero-knowledge protocol for a non-trivial language (i.e., for a language outside BPP), whose security is proven via black-box simulation, must use at least ~ (log n) rounds of interaction. This result achieves a substantial improvement over previous lower bounds, and is the rst bound to rule out the possibility of constant-round concurrent zero-knowledge when proven ...
متن کاملA New Approach to Black-Box Concurrent Secure Computation
We consider the task of constructing concurrently composable protocols for general secure computation by making only black-box use of underlying cryptographic primitives. Existing approaches for this task first construct a black-box version of CCA-secure commitments which provide a strong form of concurrent security to the committed value(s). This strong form of security is then crucially used ...
متن کاملOn the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the informationtheoretic setting implies their security under concurrent composition. We show that security in the stand-alone model proven using black-box simulators in the information-theoretic setting does not imply security under concurrent composition, not even security under 2-bounded concurrent self-composition with an ineffici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015