Constant-round leakage-resilient zero-knowledge from collision resistance

1Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We construct a constant-round leakage-resilient zeroknowledge argument system under the existence of collision-resistant hash function family. That is, using collision-resistant hash functions, we construct a constant-round zero-knowledge argument system such that for any cheating verifier that can obtain arbitrary amount of leakage of the prover’s state, there exists a simulator that can simulate the adversary’s view by obtaining at most the same amount of leakage of the witness. Previously, leakage-resilient zero-knowledge protocols were constructed only under a relaxed security definition (Garg-Jain-Sahai, CRYPTO’11) or under the DDH assumption (Pandey, TCC’14). Our leakage-resilient zero-knowledge argument system satisfies an additional property that it is simultaneously leakage-resilient zeroknowledge, meaning that both zero-knowledgeness and soundness hold in the presence of leakage.

Cite

CITATION STYLE

APA

Kiyoshima, S. (2016). Constant-round leakage-resilient zero-knowledge from collision resistance. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9666, pp. 93–123). Springer Verlag. https://doi.org/10.1007/978-3-662-49896-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free