Post-quantum zero knowledge in constant rounds
N Bitansky, O Shmueli - Proceedings of the 52nd Annual ACM SIGACT …, 2020 - dl.acm.org
We construct a constant-round zero-knowledge classical argument for NP secure against
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …
Weak zero-knowledge beyond the black-box barrier
The round complexity of zero-knowledge protocols is a long-standing open question, yet to
be settled under standard assumptions. So far, the question has appeared equally …
be settled under standard assumptions. So far, the question has appeared equally …
On the impossibility of approximate obfuscation and applications to resettable cryptography
The traditional notion of program obfuscation requires that an obfuscation~ Prog of a
program Prog computes the exact same function as Prog, but beyond that, the code of~ Prog …
program Prog computes the exact same function as Prog, but beyond that, the code of~ Prog …
Four-round concurrent non-malleable commitments from one-way functions
How many rounds and which assumptions are required for concurrent non-malleable
commitments? The above question has puzzled researchers for several years. Pass in [TCC …
commitments? The above question has puzzled researchers for several years. Pass in [TCC …
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds
In this work we start from the following two results in the state-of-the art: 1. 4-round non-
malleable zero knowledge (NMZK): Goyal et al. in FOCS 2014 showed the first 4-round one …
malleable zero knowledge (NMZK): Goyal et al. in FOCS 2014 showed the first 4-round one …
Constant-round concurrent zero-knowledge from indistinguishability obfuscation
We present a constant-round concurrent zero-knowledge protocol for NP NP. Our protocol
relies on the existence of families of collision-resistant hash functions, one-way …
relies on the existence of families of collision-resistant hash functions, one-way …
Indistinguishability obfuscation of iterated circuits and RAM programs
A key source of inefficiency in existing obfuscation schemes is that they operate on
programs represented as Boolean circuits or (with stronger assumptions and costlier …
programs represented as Boolean circuits or (with stronger assumptions and costlier …
From weak to strong zero-knowledge and applications
The notion of zero-knowledge [20] is formalized by requiring that for every malicious efficient
verifier V*, there exists an efficient simulator S that can reconstruct the view of V* in a true …
verifier V*, there exists an efficient simulator S that can reconstruct the view of V* in a true …
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC
We provide counterexamples to the``dream''version of Yao's XOR Lemma. In particular, we
put forward explicit candidates for hard predicates, such that the advantage of predicting the …
put forward explicit candidates for hard predicates, such that the advantage of predicting the …
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP
We show the following result: Assuming the existence of p ublic-coin differing-input
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …