Non-Conversation-Based Zero Knowledge∗

نویسندگان

  • JOËL ALWEN
  • GIUSEPPE PERSIANO
  • IVAN VISCONTI
چکیده

In a zero-knowledge proof system Π a honest verifier V accepts or rejects a proof basing its decision on the common input, its randomness and the exchanged messages. Π is conversation based if an observer D guesses V ′ decision only knowing the common input and the exchanged messages and without knowing V ’s randomness. In this paper we prove a separation between conversation-based and non-conversation based zero knowledge. In particular we show that a variant of 3-round conversation-based black-box concurrent zero knowledge with sequential soundness in the Bare Public-Key model already known to be impossible for non-trivial languages, is instead possible using a non-conversation-based protocol. The result is obtained considering an impatient verifier, that is a natural extension of the non-aborting verifier previously used in [Rosen, CRYPTO 2000]. ∗The work presented in this paper has been supported in part by the European Commission through the IST Program under contract IST-2002-507932 ECRYPT and through the FP6 program under contract FP6-1596 AEOLUS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pros and Cons of Dancing in the Dark: Enhancing EFL learners' oral proficiency in an unplugged learning community

Recent thrust of research has focused on non-conventional classrooms for teaching to EFL learners. Amongst the newly developed models, Unplugged Classroom Model (UCM) is the most debated one as textbooks are aside and the syllabus is based on conversation-driven activities. This study sought to determine the pros and cons of unplugged teaching for enhancing EFL learners' oral proficiency. From ...

متن کامل

Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract)

\Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polynomial-time player to convince another polynomial-time player of the validity of an NP statement, without revealing any additional information in the information-theoretic sense. Despite their practical and theoretical importance, it was only known how to implement zero-knowledge arguments based on speci c ...

متن کامل

Perfect Zero - Knowledge Arguments for NPCan

\Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polynomial-time player to convince another polynomial-time player of the validity of an NP statement, without revealing any additional information in the information-theoretic sense. Despite their practical and theoretical importance, it was only known how to implement zero-knowledge arguments based on speciic ...

متن کامل

Deniable Ring Authentication

Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...

متن کامل

Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system

In this paper, we evaluate mass knowledge acquisition using modified ALICE chatterbots. In particular we investigate the potential of allowing subjects to modify chatterbot responses to see if distributed learning from a web environment can succeed. This experiment looks at dividing knowledge into general conversation and domain specific categories for which we have selected telecommunications....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007