Affiliation:
1. Microsoft Research SVC, Mountain View, California
2. Weizmann Institute of Science, Rehovot, Israel
3. University of California, Los Angeles, California
Abstract
Concurrent executions of a zero-knowledge protocol by a single prover (with one or more verifiers) may leak information and may not be zero-knowledge
in toto
. In this article, we study the problem of maintaining zero-knowledge.We introduce the notion of an (α, β)
timing constraint
: for any two processors
P
1
and
P
2
, if
P
1
measures α elapsed time on its local clock and
P
2
measures β elapsed time on its local clock, and
P
2
starts
after
P
1
does, then
P
2
will finish after
P
1
does. We show that if the adversary is constrained by an (α, β) assumption then there exist four-round almost concurrent zero-knowledge interactive proofs and perfect concurrent zero-knowledge arguments for every language in
NP
. We also address the more specific problem of
Deniable Authentication
, for which we propose several particularly efficient solutions. Deniable Authentication is of independent interest, even in the sequential case; our concurrent solutions yield sequential solutions
without recourse to timing
, that is, in the standard model.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference71 articles.
1. Agrawal M. Kayal N. and Saxena N. 2002. Primes is in P. Manuscript.]] Agrawal M. Kayal N. and Saxena N. 2002. Primes is in P. Manuscript.]]
2. Bach E. and Shallit J. 1996. Algorithmic Number Theory: Efficient Algorithms. MIT Press Cambridge Mass.]] Bach E. and Shallit J. 1996. Algorithmic Number Theory: Efficient Algorithms. MIT Press Cambridge Mass.]]
3. Bellare M. and Goldwasser S. 1996. Encapsulated key escrow. Manuscript Nov. (Earlier version was MIT Laboratory for Computer Science Technical Report 688 April 1996.)]] Bellare M. and Goldwasser S. 1996. Encapsulated key escrow. Manuscript Nov. (Earlier version was MIT Laboratory for Computer Science Technical Report 688 April 1996.)]]
Cited by
91 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献