How to construct constant-round zero-knowledge proof systems for NP

From MaRDI portal
Publication:1924196

zbMath0855.68085MaRDI QIDQ1924196

Ariel Kahan, Oded Goldreich

Publication date: 14 October 1996

Published in: Journal of Cryptology (Search for Journal in Brave)




Related Items

A black-box approach to post-quantum zero-knowledge in constant roundsOn the concurrent composition of quantum zero-knowledgeHow to construct physical zero-knowledge proofs for puzzles with a ``single loop conditionEfficient set intersection with simulation-based securityConcurrent knowledge extraction in public-key modelsRound-optimal fully black-box zero-knowledge arguments from one-way permutationsRound optimal black-box ``commit-and-proveConstant-round leakage-resilient zero-knowledge from collision resistanceOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationPractical and Provably-Secure Commitment Schemes from Collision-Free HashingThree-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of KnowledgeA note on the Dwork-Naor timed deniable authentication3-Message Zero Knowledge Against Human IgnorancePolynomial runtime and composabilityMinimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key ModelRound-optimal zero-knowledge proofs of knowledge for NPZero-knowledge IOPs with linear-time prover and polylogarithmic-time verifierProofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsOn the power of rewinding simulators in functional encryptionA note on constant-round zero-knowledge proofs of knowledgeOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsSignatures and Efficient Proofs on Committed Graphs and NP-StatementsStatistical concurrent non-malleable zero-knowledge from one-way functionsConstant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NPPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundStatistical security in two-party computation revisitedDoubly adaptive zero-knowledge proofsLower bounds and impossibility results for concurrent self compositionKnowledge encryption and its applications to simulatable protocols with low round-complexityReverse firewalls for oblivious transfer extension and applications to zero-knowledgeExistence of 3-round zero-knowledge proof systems for NPBrakedown: linear-time and field-agnostic SNARKs for R1CSFully-Simulatable Oblivious Set TransferWhich languages have 4-round zero-knowledge proofs?A new approach to efficient non-malleable zero-knowledgeSteganography-free zero-knowledgeConstant-round adaptive zero-knowledge proofs for NPRound-optimal black-box MPC in the plain modelPublic-coin parallel zero-knowledge for NPEfficient set operations in the presence of malicious adversariesPost-quantum resettably-sound zero knowledgeThe round complexity of quantum zero-knowledgeOn expected polynomial runtime in cryptographyConcurrent zero knowledge, revisitedCryptographic reverse firewalls for interactive proof systemsAdaptive zero-knowledge proofs and adaptively secure oblivious transferEfficient one-sided adaptively secure computationThe Knowledge Complexity of Interactive Proof SystemsMagic Adversaries Versus Individual Reduction: Science Wins Either WayLower bounds for non-black-box zero knowledgeOn expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefitsOne-Time ProgramsAn Equivalence Between Zero Knowledge and CommitmentsThe Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial CharacterizationNon-Black-Box Simulation from One-Way Functions and Applications to Resettable SecurityOn the enumeration of minimal non-pairwise compatibility graphsEfficient Fully-Simulatable Oblivious TransferOn the power of secure two-party computationFour-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for CircuitsPost-quantum multi-party computationHandling expected polynomial-time strategies in simulation-based security proofsHybrid commitments and their applications to zero-knowledge proof systemsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelOn publicly-accountable zero-knowledge and small shuffle argumentsReducing complexity assumptions for statistically-hiding commitmentTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesNew approaches for deniable authenticationEye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing ModelComposition of Zero-Knowledge Proofs with Efficient ProversPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsConstant-Round Nonmalleable Commitments from Any One-Way FunctionNew efficient and secure protocols for verifiable signature sharing and other applicationsFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsBlack-box transformations from passive to covert security with public verifiabilityAn efficient protocol for secure two-party computation in the presence of malicious adversariesHow to Simulate It – A Tutorial on the Simulation Proof TechniqueInteractive physical ZKP for connectivity: applications to Nurikabe and Hitori