Zero-knowledge proofs in theory and practice

نویسنده

  • David Bernhard
چکیده

Zero-knowledge proof schemes are one of the main building blocks of modern cryptography. Using the Helios voting protocol as a practical example, we show mistakes in the previous understanding of these proof schemes and the resulting security problems. We proceed to deVne a hierarchy of security notions that solidiVes our understanding of proof schemes: weak proof schemes, strong proof schemes and multi-proofs. We argue that the problems in Helios result from its use of weak proofs and show how these proofs can be made strong. We provide the Vrst proof of ballot privacy for full Helios ballots with strong proofs. In Helios, a proof scheme commonly known as Fiat-Shamir-Schnorr is used to strengthen encryption, a construction also known as Signed ElGamal or more generally, Encrypt+PoK. We show that in the Encrypt+PoK construction, our hierarchy of proof scheme notions corresponds naturally to a well-known hierarchy of security notions for public-key encryption: weak proofs yield chosen-plaintext secure encryption, strong proofs yield non-malleable encryption and multi-proofs yield chosen-ciphertext secure encryption. Next, we ask whether Signed ElGamal is chosen-ciphertext secure, a question closely related but not identical to whether Fiat-Shamir-Schnorr proofs are multi-proofs. We answer both these questions negatively: under a reasonable assumption, the failure of which would cast doubt on the security of Schnorr-like proofs, we prove that Signed ElGamal cannot be shown to be chosenciphertext secure by a reduction to the security of plain ElGamal. This answers an open question, to our knowledge Vrst asked by Shoup and Gennaro in a paper published in 1998.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Concrete Complexity of Zero-Knowledge Proofs

The fact that there are zero-knowledge proofs for all languages in NP has, potentially, enormous implications to cryptography. For cryptographers, the issue is no longer \which languages in NP have zero-knowledge proofs" but rather \which languages in NP have practical zero-knowledge proofs". Thus, the concrete complexity of zero-knowledge proofs for diierent languages must be established. In t...

متن کامل

Efficient Non-interactive Proof Systems for Bilinear Groups

Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the theory of cryptography. However, lack of efficiency has prevented them from being used in practice. One of the roots of this inefficiency is that noninteractive zero-knowledge proofs have been constructed for general NP-complete languages such as Circuit Satisfiability,...

متن کامل

Zero-Knowledge twenty years after its invention

Zero-knowledge proofs are proofs that are both convincing and yet yield nothing beyond the validity of the assertion being proven. Since their introduction about twenty years ago, zero-knowledge proofs have attracted a lot of attention and have, in turn, contributed to the development of other areas of cryptography and complexity theory. We survey the main deenitions and results regarding zero-...

متن کامل

نظریه پردازی بر فرآیند انتقال دانش نظری به حوزه عمل در پرستاری: رویکرد گراندد تئوری

Introduction & Objective: Knowledge transfer and in fact, the bridging of theory and practice is one of the main concerns of all academic disciplines. Getting prominent professional status is the thing that can be achieved by knowledge-based function, and of which would be called as successful discipline that it be able to transfer its theoretical paradigmatic claims into practice. Accordingly,...

متن کامل

EECS 574 : Computational Complexity Theory Final

Zero-knowledge proofs are proofs that yield nothing (i.e. knowledge) beyond the validity of the assertion being proven. This fascinating nature made them directly applicable in the domain of cryptography: they were typically used to force malicious parties to behave according to a predetermined protocol. In addition to their intermediate applicability in cryptography, zero-knowledge proofs serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014