Skip to main content

Zero-knowledge proofs of decision power: New protocols and optimal round-complexity

  • Session 1: Theoretical Foundations of Security
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

We consider perfect zero-knowledge proof systems for “proving the power to decide whether a membership in a language is true or not”. We extend the definition of the model, and then extend the class of languages in it; (so far only the language of quadratic residuosity modulo a Blum integer was known to be applicable to this model). More precisely, we present a protocol for all known random self-reducible languages (i.e., graph isomorphism, quadratic residuosity, discrete log). This protocol can be executed with only 4 rounds of communication. Finally we extend a well-known lower bound for the number of rounds of zero-knowledge proofs of membership to our “decision power model”. This shows that (under some technical restrictions) our protocol is round-optimal unless the considered language is in BPP (which seems unlikely).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi, J. Feigenbaum, and J. Kilian, On Hiding Information from an Oracle, STOC 87.

    Google Scholar 

  2. M. Bellare and O. Goldreich, On Defining Proofs of Knowledge, CRYPTO '92.

    Google Scholar 

  3. M. Bellare, S. Micali, and R. Ostrovsky, Perfect Zero Knowledge in Constant Rounds, STOC 90.

    Google Scholar 

  4. G. Di Crescenzo and G. Persiano, Round-Optimal Perfect Zero-Knowledge Proofs, Information Processing Letters, vol. 50, (1994), pag. 93–99.

    Article  Google Scholar 

  5. A. De Santis, G. Di Crescenzo, G. Persiano, The Knowledge Complexity of Quadratic Residuosity Languages, Theoretical Computer Science, vol. 132, (1994), pag. 291–317.

    Article  Google Scholar 

  6. A. De Santis, G. Di Crescenzo, G. Persiano and M. Yung, On Monotone Formula Closure of SZK, FOGS 94.

    Google Scholar 

  7. U. Feige, A. Fiat, and A. Shamir, Zero-Knowledge Proofs of Identity, Journal of Cryptology, vol. 1, 1988, pp. 77–94.

    Google Scholar 

  8. U. Feige and A. Shamir, Witness-Indistinguishable and Witness-Hiding Protocols, STOC 90.

    Google Scholar 

  9. L. Fortnow, The Complexity of Perfect Zero Knowledge, STOC 87.

    Google Scholar 

  10. Z. Galil, S. Haber, and M. Yung, Minimum-Knowledge Interactive Proofs for Decision Problems, SIAM Journal on Computing, vol. 18, n.4, pp. 711–739 (previous version in FOGS 85).

    Google Scholar 

  11. O. Goldreich and H. Krawczyk, On the Composition of Zero-Knowledge Proof Systems, ICALP 1990.

    Google Scholar 

  12. O. Goldreich, S. Micali, and A. Wigderson, Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, vol. 38, n. 1, 1991, pp. 691–729.

    Article  Google Scholar 

  13. O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, STOC 88.

    Google Scholar 

  14. S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM Journal on Computing, vol. 18, n. 1, February 1989.

    Google Scholar 

  15. K. Sakurai, A hidden cryptographic assumption in no-transferable identification schemes, Asiacrypt 96.

    Google Scholar 

  16. M. Tompa and H. Woll, Random Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information, FOGS 87.

    Google Scholar 

  17. A. Yao, Theory and Applications of Trapdoor Functions, FOGS 85.

    Google Scholar 

  18. M. Yung, Zero-Knowledge Proofs of Computational Power, Eurocrypt 89.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

di Crescenzo, G., Sakurai, K., Yung, M. (1997). Zero-knowledge proofs of decision power: New protocols and optimal round-complexity. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028458

Download citation

  • DOI: https://doi.org/10.1007/BFb0028458

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics