Efficient Non-interactive Range Proof

被引:0
|
作者
Yuen, Tsz Hon [1 ]
Huang, Qiong [2 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Wong, Duncan S. [2 ]
Yang, Guomin [2 ]
机构
[1] Univ Wollongong, Wollongong, NSW 2522, Australia
[2] City Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
来源
关键词
COMPLEXITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the first constant size non-interactive range proof which is not based on the heuristic Fiat-Shamir transformation and whose security does not rely on the random oracle assumption. The proof consists of a constant number of group elements. Compared with the most efficient constant-size range proof available in the literature, our scheme has significantly reduced the proof size. We showed that our scheme achieves perfect completeness, perfect soundness and composable zero-knowledge under a conventional number-theoretic assumption, namely the Subgroup Decision Problem.
引用
收藏
页码:138 / +
页数:3
相关论文
共 50 条
  • [41] Non-Interactive Anonymous Router
    Shi, Elaine
    Wu, Ke
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT III, 2021, 12698 : 489 - 520
  • [42] Non-interactive proofs of proximity
    Tom Gur
    Ron D. Rothblum
    [J]. computational complexity, 2018, 27 : 99 - 207
  • [43] Non-Interactive Key Exchange
    Freire, Eduarda S. V.
    Hofheinz, Dennis
    Kiltz, Eike
    Paterson, Kenneth G.
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 254 - 271
  • [44] Energy-efficient and non-interactive self-certification in MANETs
    Yi, Jeong Hyun
    [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4280 : 533 - 547
  • [45] Efficient machine learning over encrypted data with non-interactive communication
    Park, Heejin
    Kim, Pyung
    Kim, Heeyoul
    Park, Ki-Woong
    Lee, Younho
    [J]. COMPUTER STANDARDS & INTERFACES, 2018, 58 : 87 - 108
  • [46] Communication-efficient non-interactive proofs of knowledge with online extractors
    Fischlin, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 152 - 168
  • [47] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [48] PRE: Stronger security notions and efficient construction with non-interactive opening
    Zhang, Jiang
    Zhang, Zhenfeng
    Chen, Yu
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 1 - 16
  • [49] Efficient Non-interactive Universally Composable String-Commitment Schemes
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 3 - +
  • [50] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    ChunMing Tang
    DingYi Pei
    XiaoFeng Wang
    ZhuoJun Liu
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 128 - 144