Point Obfuscation and 3-Round Zero-Knowledge View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Nir Bitansky , Omer Paneth

ABSTRACT

We construct 3-round proofs and arguments with negligible soundness error satisfying two relaxed notions of zero-knowledge (ZK): weak ZK and witness hiding (WH). At the heart of our constructions lie new techniques based on point obfuscation with auxiliary input (AIPO).It is known that such protocols cannot be proven secure using black-box reductions (or simulation). Our constructions circumvent these lower bounds, utilizing AIPO (and extensions) as the “non-black-box component” in the security reduction. More... »

PAGES

190-208

Book

TITLE

Theory of Cryptography

ISBN

978-3-642-28913-2
978-3-642-28914-9

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_11

DOI

http://dx.doi.org/10.1007/978-3-642-28914-9_11

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1022556466


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Boston University, USA", 
          "id": "http://www.grid.ac/institutes/grid.189504.1", 
          "name": [
            "Tel Aviv University, Israel", 
            "Boston University, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bitansky", 
        "givenName": "Nir", 
        "id": "sg:person.016302552357.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016302552357.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Boston University, USA", 
          "id": "http://www.grid.ac/institutes/grid.189504.1", 
          "name": [
            "Tel Aviv University, Israel", 
            "Boston University, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Paneth", 
        "givenName": "Omer", 
        "id": "sg:person.014073524511.68", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014073524511.68"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "We construct 3-round proofs and arguments with negligible soundness error satisfying two relaxed notions of zero-knowledge (ZK): weak ZK and witness hiding (WH). At the heart of our constructions lie new techniques based on point obfuscation with auxiliary input (AIPO).It is known that such protocols cannot be proven secure using black-box reductions (or simulation). Our constructions circumvent these lower bounds, utilizing AIPO (and extensions) as the \u201cnon-black-box component\u201d in the security reduction.", 
    "editor": [
      {
        "familyName": "Cramer", 
        "givenName": "Ronald", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-28914-9_11", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-28913-2", 
        "978-3-642-28914-9"
      ], 
      "name": "Theory of Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "zero-knowledge", 
      "witness hiding", 
      "point obfuscation", 
      "negligible soundness error", 
      "security reduction", 
      "black-box reductions", 
      "such protocols", 
      "soundness error", 
      "relaxed notion", 
      "box components", 
      "auxiliary input", 
      "obfuscation", 
      "lower bounds", 
      "hiding", 
      "new technique", 
      "protocol", 
      "input", 
      "proof", 
      "construction", 
      "error", 
      "bounds", 
      "technique", 
      "knowledge", 
      "notion", 
      "AIPO", 
      "components", 
      "zeros", 
      "reduction", 
      "argument", 
      "heart"
    ], 
    "name": "Point Obfuscation and 3-Round Zero-Knowledge", 
    "pagination": "190-208", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1022556466"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-28914-9_11"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-28914-9_11", 
      "https://app.dimensions.ai/details/publication/pub.1022556466"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:35", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_432.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-28914-9_11"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_11'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_11'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_11'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_11'


 

This table displays all metadata directly associated to this object as RDF triples.

98 TRIPLES      23 PREDICATES      56 URIs      49 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-28914-9_11 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nb9913852b39243979489804ce9d468cb
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description We construct 3-round proofs and arguments with negligible soundness error satisfying two relaxed notions of zero-knowledge (ZK): weak ZK and witness hiding (WH). At the heart of our constructions lie new techniques based on point obfuscation with auxiliary input (AIPO).It is known that such protocols cannot be proven secure using black-box reductions (or simulation). Our constructions circumvent these lower bounds, utilizing AIPO (and extensions) as the “non-black-box component” in the security reduction.
7 schema:editor N4deff07e221b469c830196fbaeed4534
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nee1d66bfad1d43bfa5ddcf87cee4c10a
12 schema:keywords AIPO
13 argument
14 auxiliary input
15 black-box reductions
16 bounds
17 box components
18 components
19 construction
20 error
21 heart
22 hiding
23 input
24 knowledge
25 lower bounds
26 negligible soundness error
27 new technique
28 notion
29 obfuscation
30 point obfuscation
31 proof
32 protocol
33 reduction
34 relaxed notion
35 security reduction
36 soundness error
37 such protocols
38 technique
39 witness hiding
40 zero-knowledge
41 zeros
42 schema:name Point Obfuscation and 3-Round Zero-Knowledge
43 schema:pagination 190-208
44 schema:productId N795bd52bd5454d1692bdb845f68c0f0c
45 Nc5004eb6a631421d8c28d7de766cfaae
46 schema:publisher Ncff7ca6bd6a04bb5809d9dbd6fe3121b
47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022556466
48 https://doi.org/10.1007/978-3-642-28914-9_11
49 schema:sdDatePublished 2022-06-01T22:35
50 schema:sdLicense https://scigraph.springernature.com/explorer/license/
51 schema:sdPublisher N8875a8bdb8634ede88f82ca90f9b863b
52 schema:url https://doi.org/10.1007/978-3-642-28914-9_11
53 sgo:license sg:explorer/license/
54 sgo:sdDataset chapters
55 rdf:type schema:Chapter
56 N4deff07e221b469c830196fbaeed4534 rdf:first Nc84c91425cee4edda4b2666fe3f1b4de
57 rdf:rest rdf:nil
58 N795bd52bd5454d1692bdb845f68c0f0c schema:name doi
59 schema:value 10.1007/978-3-642-28914-9_11
60 rdf:type schema:PropertyValue
61 N8875a8bdb8634ede88f82ca90f9b863b schema:name Springer Nature - SN SciGraph project
62 rdf:type schema:Organization
63 Nb9913852b39243979489804ce9d468cb rdf:first sg:person.016302552357.74
64 rdf:rest Ne1c49bebec0542519b3f502871a48a2a
65 Nc5004eb6a631421d8c28d7de766cfaae schema:name dimensions_id
66 schema:value pub.1022556466
67 rdf:type schema:PropertyValue
68 Nc84c91425cee4edda4b2666fe3f1b4de schema:familyName Cramer
69 schema:givenName Ronald
70 rdf:type schema:Person
71 Ncff7ca6bd6a04bb5809d9dbd6fe3121b schema:name Springer Nature
72 rdf:type schema:Organisation
73 Ne1c49bebec0542519b3f502871a48a2a rdf:first sg:person.014073524511.68
74 rdf:rest rdf:nil
75 Nee1d66bfad1d43bfa5ddcf87cee4c10a schema:isbn 978-3-642-28913-2
76 978-3-642-28914-9
77 schema:name Theory of Cryptography
78 rdf:type schema:Book
79 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
80 schema:name Information and Computing Sciences
81 rdf:type schema:DefinedTerm
82 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
83 schema:name Data Format
84 rdf:type schema:DefinedTerm
85 sg:person.014073524511.68 schema:affiliation grid-institutes:grid.189504.1
86 schema:familyName Paneth
87 schema:givenName Omer
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014073524511.68
89 rdf:type schema:Person
90 sg:person.016302552357.74 schema:affiliation grid-institutes:grid.189504.1
91 schema:familyName Bitansky
92 schema:givenName Nir
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016302552357.74
94 rdf:type schema:Person
95 grid-institutes:grid.189504.1 schema:alternateName Boston University, USA
96 schema:name Boston University, USA
97 Tel Aviv University, Israel
98 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...