2013
DOI: 10.1007/978-3-642-42033-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Constant-Round Concurrent Zero Knowledge in the Bounded Player Model

Abstract: Abstract. In [18] Goyal et al. introduced the bounded player model for secure computation. In the bounded player model, there are an a priori bounded number of players in the system, however, each player may execute any unbounded (polynomial) number of sessions. They showed that even though the model consists of a relatively mild relaxation of the standard model, it allows for round-efficient concurrent zero knowledge. Their protocol requires a super-constant number of rounds. In this work we show, constructiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 38 publications
(84 reference statements)
0
2
0
Order By: Relevance
“…Zero-knowledge proof is the foundation of many kinds of security protocol, and has been widely used to achieve identity authentication, electronic voting protocols and many other application protocols. Some new models and methods [74,75] have recently appeared in particular applications [76] of zero-knowledge proof.…”
Section: Cryptographic Protocolsmentioning
confidence: 99%
“…Zero-knowledge proof is the foundation of many kinds of security protocol, and has been widely used to achieve identity authentication, electronic voting protocols and many other application protocols. Some new models and methods [74,75] have recently appeared in particular applications [76] of zero-knowledge proof.…”
Section: Cryptographic Protocolsmentioning
confidence: 99%
“…Inspired by the work of Lin and Pass [20], we instead require the prover to show that it knows a transcript-that has been signed, message-by-message, by the verifier through a "signature-chain". A similar approach was used also in [11,19]. Once we have done this change, we can simply remove all messages in the preamble phase (where the honest prover commits to 0) and just replace them with a signature slot.…”
Section: Barak's Protocol and The Bggl Transformationmentioning
confidence: 99%