Notes for Lecture 3 Scribe : Sandro

نویسندگان

  • Ueli Maurer
  • Martin Hirt
  • Sandro Coretti
چکیده

About the notes: These notes serve as written reference for the topics not covered by the papers that are handed out during the lecture. The material contained therein is thus a strict subset of what is relevant for the final exam. This week, the notes discuss the definition of (perfect) zero-knowledge and a proof that the three-move protocols we have encountered so far (graph isomorphism, Fiat-Shamir, Guillou-Quisqater, Schnorr) are perfectly zero-knowledge [Mau09, Theorem 2]. Intuitively, an interactive proof (P, V) between a prover P and verifier V is zero-knowledge if after interacting with P , any verifier V has no more information than before executing the protocol. This is captured by the notion of a simulator S that reproduces V 's view in the proof without actually communicating with P. More precisely, consider the following two random experiments: 1. Prover P interacts with V ; let Z be the random variable corresponding to the resulting transcript and P Z its distribution. 2. Simulator S interacts with V and outputs a transcript; let Z denote the corresponding random variable andˆP Z its distribution. Definition 3.1. An interactive proof (P, V) is (perfectly) zero-knowledge if for every efficient V there exists an efficient simulator S (with access to V) producing a transcript Z that is distributed identically to the transcript Z in the actual interaction between P and The interactive proof is honest-verifier zero-knowledge (HVZK) if the simulator exists for (the honest) verifier V. In this course, when proving the zero-knowledge property, there will always be a single simulator S that works for all verifiers V. This is referred to as black-box simulation. The HVZK property is perhaps not very interesting per se, but it is a useful tool in proving (perfect) zero-knowledge. All three-move protocols in this course satisfy the even stronger

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Protocols Notes for Lecture 8 Scribe

A t-out-of-n secret-sharing scheme allows an honest dealer D to distribute a secret s among n players, such that any subset of t players has no information about s, but every set of t + 1 players can collaboratively reconstruct the secret. The most famous secret-sharing scheme is Shamir’s Sharing Scheme [Sha79] (cf. Section 8.1.2). It uses polynomials to obtain the desired properties. Before pr...

متن کامل

CS 49 : Data Stream Algorithms Lecture Notes , Fall 2011 Amit

Acknowledgements These lecture notes began as rough scribe notes for a Fall 2009 offering of the course " Data Stream Algorithms " at Dartmouth College. The initial scribe notes were prepared mostly by students enrolled in the course in 2009. Subsequently, during a Fall 2011 offering of the course, I edited the notes heavily, bringing them into presentable form, with the aim being to create a r...

متن کامل

Cs49: Data Stream Algorithms Lecture Notes, Fall 2011

Acknowledgements These lecture notes began as rough scribe notes for a Fall 2009 offering of the course " Data Stream Algorithms " at Dartmouth College. The initial scribe notes were prepared mostly by students enrolled in the course in 2009. Subsequently, during a Fall 2011 offering of the course, I edited the notes heavily, bringing them into presentable form, with the aim being to create a r...

متن کامل

Cryptographic Protocols Notes for Lecture 2 Scribe :

Algorithms are commonly formalized as Turing machines, which are the basis for defining notions such as running time and space complexity; the exact formalism, however, is of no concern in this lecture. For our purposes, an algorithm A takes some input x ∈ {0, 1}∗, performs some computation, and outputs a value A(x). Running time and space complexity of an algorithm are measured as a function o...

متن کامل

Cryptographic Protocols Notes for Lecture 1 Scribe :

A group is a mathematical structure 〈G; ∗〉 consisting of a non-empty set G and a binary operation ∗ : G×G→ G and satisfying the following axioms: (A1) The operation ∗ is associative, i.e., for any x, y, z ∈ G, x ∗ (y ∗ z) = (x ∗ y) ∗ z. (A2) There exists a neutral element e for ∗, i.e., x ∗ e = e ∗ x = x for all x ∈ G. (A3) Every element x ∈ G has an inverse x̂, i.e., x ∗ x̂ = x̂ ∗ x = e. If ∗ is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015