Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer

被引:0
|
作者
Lindell, Yehuda [1 ]
Zarosim, Hila [1 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, IL-52100 Ramat Gan, Israel
来源
THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009 | 2009年 / 5444卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that it controls a predetermined subset of the parties) or adaptive (meaning that it can choose to corrupt parties during the protocol execution and based on what it sees). In this paper, we study two fundamental questions relating to the basic zero-knowledge and oblivious transfer protocol problems: Adaptive zero-knowledge proofs: We ask whether it is possible to construct adaptive zero-knowledge proofs (with unconditional soundness). Beaver (STOC 1996) showed that known zero-knowledge proofs are not adaptively secure, and in addition showed how to construct zero-knowledge arguments (with computational soundness). Adaptively secure oblivious transfer: All known protocols for adaptively secure oblivious transfer rely on seemingly stronger hardness assumptions than for the case of static adversaries. We ask whether this is inherent, and in particular, whether it is possible to construct adaptively secure oblivious transfer from enhanced trapdoor permutations alone. We provide surprising answers to the above questions, showing that achieving adaptive security is sometimes harder than achieving static security, and sometimes not. First, we show that assuming the existence of one-way functions only, there exist adaptive zero-knowledge proofs for all languages in NP. In order to prove this, we overcome the problem that all adaptive zero-knowledge protocols known until now used equivocal commitments (which would enable an all-powerful prover to cheat). Second, we prove a black-box separation between adaptively secure oblivious transfer and enhanced trapdoor permutations. As a corollary, we derive a black-box separation between adaptively and statically securely oblivious transfer. This is the first black-box separation to relate to adaptive security and thus the first evidence that it is indeed harder to achieve security in the presence of adaptive adversaries than in the presence of static adversaries.
引用
收藏
页码:183 / 201
页数:19
相关论文
共 50 条
  • [21] Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
    Chakraborty, Suvradip
    Ganesh, Chaya
    Sarkar, Pratik
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 239 - 270
  • [22] Constant-round adaptive zero-knowledge proofs for NP
    Zhang, Zongyang
    Cao, Zhenfu
    Zhu, Haojin
    INFORMATION SCIENCES, 2014, 261 : 219 - 236
  • [23] Zero-knowledge proofs of knowledge for group homomorphisms
    Maurer, Ueli
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 663 - 676
  • [24] The power of preprocessing in zero-knowledge proofs of knowledge
    DeSantis, A
    Persiano, G
    JOURNAL OF CRYPTOLOGY, 1996, 9 (03) : 129 - 148
  • [25] Zero-knowledge proofs of knowledge for group homomorphisms
    Ueli Maurer
    Designs, Codes and Cryptography, 2015, 77 : 663 - 676
  • [26] Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge
    Song, Yongcheng
    Zhang, Jiang
    Huang, Xinyi
    Wu, Wei
    Yang, Haining
    THEORETICAL COMPUTER SCIENCE, 2023, 952
  • [27] Experimental relativistic zero-knowledge proofs
    Alikhani, Pouriya
    Brunner, Nicolas
    Crepeau, Claude
    Designolle, Sebastien
    Houlmann, Raphael
    Shi, Weixu
    Yang, Nan
    Zbinden, Hugo
    NATURE, 2021, 599 (7883) : 47 - +
  • [28] ON THE CONCRETE COMPLEXITY OF ZERO-KNOWLEDGE PROOFS
    BOYAR, J
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 507 - 525
  • [29] Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer
    de St Guilhem, Cyprien Delpech
    Ebrahimi, Ehsan
    van Leeuwen, Barry
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 120 - 136
  • [30] Experimental relativistic zero-knowledge proofs
    Pouriya Alikhani
    Nicolas Brunner
    Claude Crépeau
    Sébastien Designolle
    Raphaël Houlmann
    Weixu Shi
    Nan Yang
    Hugo Zbinden
    Nature, 2021, 599 : 47 - 50