Constant-round adaptive zero-knowledge proofs for NP

  • Zongyang Zhang*
  • , Zhenfu Cao
  • , Haojin Zhu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Secure two-party computation allows two parties with private inputs to securely compute some function of their inputs, even in the presence of a malicious adversary. In this work, we revisit zero-knowledge proofs and focus on adaptive adversaries, which could corrupt an arbitrary number of parties and adaptively determine who and when to corrupt during the computation phase. Previous constructions could realize adaptive zero-knowledge proofs for all languages in NP (Lindell and Zarosim TCC'09) at the cost of a high round-complexity, i.e., super-constant number of rounds. In this work, assuming the existence of constant-round statistically hiding commitment schemes, we build efficient adaptive zero-knowledge proofs for all languages in NP, which only require constant number of communication rounds. The system is also a proof of knowledge. The construction relies on an adaptive instance-dependent commitment scheme, and the proof of security requires only the use of black-box techniques and is presented according to the real/ideal simulation paradigm.

Original languageEnglish
Pages (from-to)219-236
Number of pages18
JournalInformation Sciences
Volume261
DOIs
StatePublished - 10 Mar 2014
Externally publishedYes

Keywords

  • Adaptive zero-knowledge proof
  • Instance-dependent commitments
  • Proofs of knowledge
  • Trapdoor commitments

Fingerprint

Dive into the research topics of 'Constant-round adaptive zero-knowledge proofs for NP'. Together they form a unique fingerprint.

Cite this