×

Implicit zero-knowledge arguments and applications to the malicious setting. (English) Zbl 1351.94026

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 107-129 (2015).
Summary: We introduce implicit zero-knowledge arguments (\(\mathsf{iZK}\)) and simulation-sound variants thereof (\(\mathsf{SSiZK}\)); these are lightweight alternatives to zero-knowledge arguments for enforcing semi-honest behavior. Our main technical contribution is a construction of efficient two-flow \(\mathsf{iZK}\) and \(\mathsf{SSiZK}\) protocols for a large class of languages under the (plain) \(\mathsf{DDH }\) assumption in cyclic groups in the common reference string model. As an application of \(\mathsf{iZK}\), we improve upon the round-efficiency of existing protocols for securely computing inner product under the \(\mathsf{DDH}\) assumption. This new protocol in turn provides privacy-preserving biometric authentication with lower latency.
For the entire collection see [Zbl 1319.94003].

MSC:

94A60 Cryptography
68P25 Data encryption (aspects in computer science)
PDFBibTeX XMLCite
Full Text: DOI

References:

This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.