Article ID Journal Published Year Pages File Type
393891 Information Sciences 2014 18 Pages PDF
Abstract

Secure two-party computation allows two parties with private inputs to securely compute some function of their inputs, even in the presence of a malicious adversary. In this work, we revisit zero-knowledge proofs and focus on adaptive adversaries, which could corrupt an arbitrary number of parties and adaptively determine who and when to corrupt during the computation phase.Previous constructions could realize adaptive zero-knowledge proofs for all languages in NP (Lindell and Zarosim TCC’09) at the cost of a high round-complexity, i.e., super-constant number of rounds. In this work, assuming the existence of constant-round statistically hiding commitment schemes, we build efficient adaptive zero-knowledge proofs for all languages in NP, which only require constant number of communication rounds. The system is also a proof of knowledge. The construction relies on an adaptive instance-dependent commitment scheme, and the proof of security requires only the use of black-box techniques and is presented according to the real/ideal simulation paradigm.

Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, , ,