Cryptographic applications of the non-interactive metaproof and many-prover systems

18Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In a companion paper [DeYu] we have developed the tool of non-interactive proof-system we call “Metaproof” (µ-NIZK proof system); this provides a proof of “the existence of a proof to a statement”. Using a reduction of the theorem to a set of claims about encrypted values, enabled us to develop a crucial proof-system property which we called “on-hne simulaiable NIZK proof-system”. This was used to implement the “Many-Prover Non-Interactive Proof-System” where independent users can send prools (which WM not known in the original system and was open), and a “Self-Referential NIZK proof system” where the random reference string is available to the polynomial-time opponent who chooses the theorem to prove. (this wan intriguing question regarding such systems). In this abstract we present an introduction to the basic tools and their possible applications. The subject of this paper is a variety of cryptographic applications provided by the new tools. We demonstrate its applicability in enhancing security and properties of a methodology for signature and authentication developed by Bellare and Goldwasser [BeGo] (by using the Metaproof system to solve the open problem of many-prover NIZK system). We also show, among other things, how the tools can be used to provide security mechanisms such as an “Oblivious Warden” which translates non-interactive proofs to random ones independently of the proof itself, and the notion of “Gradual opening of a zero-knowledge computation” which is first demonstrated to be correct using a non-interactive proof, and then is opened gradually and fast (i.e., without further proofs).

Cite

CITATION STYLE

APA

De Santis, A., & Yung, M. (1991). Cryptographic applications of the non-interactive metaproof and many-prover systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 537 LNCS, pp. 366–377). Springer Verlag. https://doi.org/10.1007/3-540-38424-3_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free