skip to main content
research-article

New Techniques for Noninteractive Zero-Knowledge

Published:01 June 2012Publication History
Skip Abstract Section

Abstract

Noninteractive zero-knowledge (NIZK) proof systems are fundamental primitives used in many cryptographic constructions, including public-key encryption secure against chosen ciphertext attack, digital signatures, and various other cryptographic protocols. We introduce new techniques for constructing NIZK proofs based on groups with a bilinear map. Compared to previous constructions of NIZK proofs, our techniques yield dramatic reduction in the length of the common reference string (proportional to security parameter) and the size of the proofs (proportional to security parameter times the circuit size). Our novel techniques allow us to answer several long-standing open questions in the theory of noninteractive proofs. We construct the first perfect NIZK argument system for all NP. We construct the first universally composable NIZK argument for all NP in the presence of an adaptive adversary. We construct a non-interactive zap for all NP, which is the first that is based on a standard cryptographic security assumption.

References

  1. Abe, M. and Fehr, S. 2007. Perfect NIZK with adaptive soundness. In Theory of Cryptography - 4th Theory of Cryptography Conference (TCC). Lecture Notes in Computer Science Series, vol. 4392, 118--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aiello, W. and Håstad, J. 1991. Statistical zero-knowledge languages can be recognized in two rounds. J. Comput. Syst. Sci. 42, 3, 327--345. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barak, B., Ong, S. J., and Vadhan, S. P. 2007. Derandomization in cryptography. SIAM J. Comput. 37, 2, 380--400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bellare, M., Hofheinz, D., and Yilek, S. 2009. Possibility and impossibility results for encryption and commitment secure under selective opening. In Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 5479, 1--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Blum, M., Feldman, P., and Micali, S. 1988. Non-interactive zero-knowledge and its applications. In Proceedings of the ACM Symposium on Theory of Computing (STOC). 103--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Blum, M., De Santis, A., Micali, S., and Persiano, G. 1991. Noninteractive zero-knowledge. SIAM J. Comput. 20, 6, 1084--1118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Boneh, D. and Franklin, M. K. 2003. Identity-based encryption from the Weil pairing. SIAM J. Comput. 32, 3, 586--615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Boneh, D., Boyen, X., and Shacham, H. 2004. Short group signatures. In Proceedings of the 24th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 3152, 41--55.Google ScholarGoogle ScholarCross RefCross Ref
  9. Boneh, D., Goh, E.-J., and Nissim, K. 2005. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the 2nd Theory of Cryptography Conference (TCC). Lecture Notes in Computer Science Series, vol. 3378, 325--341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Boyar, J., Damgård, I., and Peralta, R. 2000. Short non-interactive cryptographic proofs. J. Cryptology 13, 4, 449--472.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Boyen, X. and Waters, B. 2006. Compact group signatures without random oracles. In Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 4004, 427--444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Boyen, X. and Waters, B. 2007. Full-domain subgroup hiding and constant-size group signatures. In Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography (PKC). Lecture Notes in Computer Science Series, vol. 4450, 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Brassard, G. and Crèpeau, C. 1986. Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 188--195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Brassard, G., Chaum, D., and Crèpeau, C. 1988. Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37, 2, 156--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Canetti, R. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 136--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Canetti, R., Feige, U., Goldreich, O., and Naor, M. 1996. Adaptively secure multi-party computation. In Proceedings of the ACM Symposium on Theory of Computing (STOC). 639--648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Canetti, R., Lindell, Y., Ostrovsky, R., and Sahai, A. 2002. Universally composable two-party and multi-party secure computation. In Proceedings of the ACM Symposium on Theory of Computing (STOC). 494--503. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Damgård, I. 1992. Non-interactive circuit based proofs and non-interactive perfect zero-knowledge with preprocessing. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 658, 341--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Damgård, I. and Nielsen, J. B. 2002. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In Proceedings of the 22nd Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 2442, 581--596. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. De Santis, A., Di Crescenzo, G., Persiano, G., and Yung, M. 1998. Image density is complete for non-interactive-SZK. In Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes in Computer Science Series, vol. 1443, 784--795. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. De Santis, A., Di Crescenzo, G., and Persiano, G. 1999. Non-interactive zero-knowledge: A low-randomness characterization of NP. In Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes in Computer Science Series, vol. 1644, 271--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. De Santis, A., Di Crescenzo, G., Ostrovsky, R., Persiano, G., and Sahai, A. 2002. Robust non-interactive zero knowledge. In Proceedings of the 22nd Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 2139, 566--598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Dolev, D., Dwork, C., and Naor, M. 2000. Non-malleable cryptography. SIAM J. Comput. 30, 2, 391--437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Dwork, C. and Naor, M. 2000. Zaps and their applications. In Proceedings of the Symposium on Foundations of Computer Science (FOCS). 283--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Feige, U., Lapidot, D., and Shamir, A. 1999. Multiple non-interactive zero knowledge proofs under general assumptions. SIAM J. Comput. 29, 1, 1--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Fortnow, L. 1987. The complexity of perfect zero-knowledge. In Proceedings of the ACM Symposium on Theory of Computing (STOC). 204--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Garay, J. A., MacKenzie, P. D., and Yang, K. 2006. Strengthening zero-knowledge protocols using signatures. J. Crypt. 19, 2, 169--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Goldreich, O. and Levin, L. A. 1989. A hard-core predicate for all one-way functions. In Proceedings of the ACM Symposium on Theory of Computing (STOC).25--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Goldreich, O., Micali, S., and Wigderson, A. 1991. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38, 3, 691--729. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Goldreich, O., Ostrovsky, R., and Petrank, E. 1998. Computational complexity and knowledge complexity. SIAM J. Comput. 27, 1116--1141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Goldreich, O., Sahai, A., and Vadhan, S. P. 1999. Can statistical zero knowledge be made non-interactive? or On the relationship of SZK and NISZK. In Proceedings of the 19th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 1666, 467--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Groth, J. 2006. Simulation-sound NIZK proofs for a practical language and constant size group signatures. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Lecture Notes in Computer Science Series, vol. 4248, 444--459. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Groth, J. 2010. Short non-interactive zero-knowledge proofs. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Lecture Notes in Computer Science Series, vol. 6477, 341--358.Google ScholarGoogle ScholarCross RefCross Ref
  34. Groth, J. and Sahai, A. 2008. Efficient non-interactive proof systems for bilinear groups. In Proceedings of the 17th Annual International Conference on the Theory and Application of Crytographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 4965, 415--432. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Groth, J., Ostrovsky, R., and Sahai, A. 2006a. Non-interactive zaps and new techniques for NIZK. In Proceedings of the 26th Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 4117, 97--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Groth, J., Ostrovsky, R., and Sahai, A. 2006b. Perfect non-interactive zero-knowledge for NP. In Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 4004, 339--358. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Hemenway, B. and Ostrovsky, R. 2010. Building injective trapdoor functions from oblivious transfer. In Proceedings of the Electronic Colloquium on Computational Complexity (ECCC) 17. 127.Google ScholarGoogle Scholar
  38. Hemenway, B., Libert, B., Ostrovsky, R., and Vergnaud, D. 2011. Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. In Proceedings of ASIACRYPT. Lecture Notes in Computer Science Series, vol. 7073, 70--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Kilian, J. and Petrank, E. 1998. An efficient noninteractive zero-knowledge proof system for NP with general assumptions. J. Crypt. 11, 1, 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Kol, G. and Naor, M. 2008. Cryptography and game theory: Designing protocols for exchanging information. In Proceedings of the 5th Theory of Cryptography Conference (TCC). Lecture Notes in Computer Science Series, vol. 4948, 320--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. MacKenzie, P. D. and Yang, K. 2004. On simulation-sound trapdoor commitments. In Proceedings of the 23rd International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science Series, vol. 3027, 382--400.Google ScholarGoogle ScholarCross RefCross Ref
  42. Naor, M. 2003. On cryptographic assumptions and challenges. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 2729, 96--109.Google ScholarGoogle ScholarCross RefCross Ref
  43. Ostrovsky, R. 1991. One-way functions, hard on average problems, and statistical zero-knowledge proofs. In Proceedings of the Structure in Complexity Theory Conference. 133--138.Google ScholarGoogle ScholarCross RefCross Ref
  44. Pass, R. 2003. On deniability in the common reference string and random oracle model. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 2729, 316--337.Google ScholarGoogle ScholarCross RefCross Ref
  45. Pass, R. and Shelat, A. 2005. Unconditional characterizations of non-interactive zero-knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 3621, 118--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Pedersen, T. P. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 576, 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Peikert, C., Vaikuntanathan, V., and Waters, B. 2008. A framework for efficient and composable oblivious transfer. In Proceedings of the Annual International Cryptology Conference (CRYPTO). Lecture Notes in Computer Science Series, vol. 5157, 554--571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Sahai, A., and Vadhan, S. P. 2003. A complete problem for statistical zero knowledge. J. ACM 50, 2, 196--249. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. New Techniques for Noninteractive Zero-Knowledge

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of the ACM
        Journal of the ACM  Volume 59, Issue 3
        June 2012
        180 pages
        ISSN:0004-5411
        EISSN:1557-735X
        DOI:10.1145/2220357
        Issue’s Table of Contents

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 2012
        • Revised: 1 February 2012
        • Accepted: 1 February 2012
        • Received: 1 September 2006
        Published in jacm Volume 59, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader