Non-Conversation-Based Zero Knowledge∗
نویسندگان
چکیده
In a zero-knowledge proof system Π a honest verifier V accepts or rejects a proof basing its decision on the common input, its randomness and the exchanged messages. Π is conversation based if an observer D guesses V ′ decision only knowing the common input and the exchanged messages and without knowing V ’s randomness. In this paper we prove a separation between conversation-based and non-conversation based zero knowledge. In particular we show that a variant of 3-round conversation-based black-box concurrent zero knowledge with sequential soundness in the Bare Public-Key model already known to be impossible for non-trivial languages, is instead possible using a non-conversation-based protocol. The result is obtained considering an impatient verifier, that is a natural extension of the non-aborting verifier previously used in [Rosen, CRYPTO 2000]. ∗The work presented in this paper has been supported in part by the European Commission through the IST Program under contract IST-2002-507932 ECRYPT and through the FP6 program under contract FP6-1596 AEOLUS.
منابع مشابه
Pros and Cons of Dancing in the Dark: Enhancing EFL learners' oral proficiency in an unplugged learning community
Recent thrust of research has focused on non-conventional classrooms for teaching to EFL learners. Amongst the newly developed models, Unplugged Classroom Model (UCM) is the most debated one as textbooks are aside and the syllabus is based on conversation-driven activities. This study sought to determine the pros and cons of unplugged teaching for enhancing EFL learners' oral proficiency. From ...
متن کاملPerfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract)
\Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polynomial-time player to convince another polynomial-time player of the validity of an NP statement, without revealing any additional information in the information-theoretic sense. Despite their practical and theoretical importance, it was only known how to implement zero-knowledge arguments based on speci c ...
متن کاملPerfect Zero - Knowledge Arguments for NPCan
\Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polynomial-time player to convince another polynomial-time player of the validity of an NP statement, without revealing any additional information in the information-theoretic sense. Despite their practical and theoretical importance, it was only known how to implement zero-knowledge arguments based on speciic ...
متن کاملDeniable Ring Authentication
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...
متن کاملEvaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system
In this paper, we evaluate mass knowledge acquisition using modified ALICE chatterbots. In particular we investigate the potential of allowing subjects to modify chatterbot responses to see if distributed learning from a web environment can succeed. This experiment looks at dividing knowledge into general conversation and domain specific categories for which we have selected telecommunications....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007