Skip to main content

Related Concepts

Zero-Knowledge

Definition

Witness hiding is a property attributed to an interactive proof or an interactive argument, similar in nature to the zero-knowledge property. If an interactive proof is zero-knowledge, it is also witness hiding, but the converse does not necessarily hold. For many applications, witness hiding protocols are sufficiently secure and more efficient than zero-knowledge protocols.

Theory

Loosely speaking, an interactive proof is witness hiding if an arbitrarily cheating verifier, after engaging in many executions of the protocol with an honest prover, is not able to compute a witness unless the verifier is able to compute one anyway, without interacting with the prover at all. In this context, a witness may be thought of as a private key, corresponding to a public key. If an interactive proof is witness hiding, it is not excluded that a cheating verifier learns some fraction of the bits of a witness. However, knowledge of such a fraction of the bits...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Cramer R, DamgĆ„rd I, Schoenmakers B (1994) Proofs of partial knowledge and simplified design of witness hiding protocols. In: DeSnedt YG (ed) Advances in cryptologyĀ ā€“ cryptoā€™94. Lecture notes in computer science, vol 839. Springer, Berlin, ppĀ 174ā€“187

    Google ScholarĀ 

  2. Feigel U, Shamir A (1990) Witness indistinguishable and witness hiding protocols.ā€ In: Silverman JH (ed) Proceedings of 22nd symposium on theory of computing (STOCā€™90). ACM Press, NewĀ York, pp 416ā€“426

    Google ScholarĀ 

  3. Goldreich O (2001) Foundations of cryptographyĀ ā€“ basic tools. Cambridge University Press, Cambridge

    BookĀ  MATHĀ  Google ScholarĀ 

  4. Okamoto T (1993) Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell EF (ed) Advances in cryptologyĀ ā€“ cryptoā€™92. Lecture notes in computer science, vol 740. Springer, Berlin, ppĀ 31ā€“53

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Schoenmakers, B. (2011). Witness Hiding. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_15

Download citation

Publish with us

Policies and ethics