Post-quantum zero knowledge in constant rounds

N Bitansky, O Shmueli - Proceedings of the 52nd Annual ACM SIGACT …, 2020 - dl.acm.org
We construct a constant-round zero-knowledge classical argument for NP secure against
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …

Weak zero-knowledge beyond the black-box barrier

N Bitansky, D Khurana, O Paneth - Proceedings of the 51st Annual ACM …, 2019 - dl.acm.org
The round complexity of zero-knowledge protocols is a long-standing open question, yet to
be settled under standard assumptions. So far, the question has appeared equally …

On the impossibility of approximate obfuscation and applications to resettable cryptography

N Bitansky, O Paneth - Proceedings of the forty-fifth annual ACM …, 2013 - dl.acm.org
The traditional notion of program obfuscation requires that an obfuscation~ Prog of a
program Prog computes the exact same function as Prog, but beyond that, the code of~ Prog …

Four-round concurrent non-malleable commitments from one-way functions

M Ciampi, R Ostrovsky, L Siniscalchi… - Advances in Cryptology …, 2017 - Springer
How many rounds and which assumptions are required for concurrent non-malleable
commitments? The above question has puzzled researchers for several years. Pass in [TCC …

Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds

M Ciampi, R Ostrovsky, L Siniscalchi… - Theory of Cryptography …, 2017 - Springer
In this work we start from the following two results in the state-of-the art: 1. 4-round non-
malleable zero knowledge (NMZK): Goyal et al. in FOCS 2014 showed the first 4-round one …

Constant-round concurrent zero-knowledge from indistinguishability obfuscation

KM Chung, H Lin, R Pass - Advances in Cryptology--CRYPTO 2015: 35th …, 2015 - Springer
We present a constant-round concurrent zero-knowledge protocol for NP NP. Our protocol
relies on the existence of families of collision-resistant hash functions, one-way …

Indistinguishability obfuscation of iterated circuits and RAM programs

R Canetti, J Holmgren, A Jain… - Cryptology ePrint …, 2014 - eprint.iacr.org
A key source of inefficiency in existing obfuscation schemes is that they operate on
programs represented as Boolean circuits or (with stronger assumptions and costlier …

From weak to strong zero-knowledge and applications

KM Chung, E Lui, R Pass - Theory of Cryptography: 12th Theory of …, 2015 - Springer
The notion of zero-knowledge [20] is formalized by requiring that for every malicious efficient
verifier V*, there exists an efficient simulator S that can reconstruct the view of V* in a true …

Refuting the dream XOR lemma via ideal obfuscation and resettable MPC

S Badrinarayanan, Y Ishai, D Khurana… - Cryptology ePrint …, 2022 - eprint.iacr.org
We provide counterexamples to the``dream''version of Yao's XOR Lemma. In particular, we
put forward explicit candidates for hard predicates, such that the advantage of predicting the …

Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP

O Pandey, M Prabhakaran, A Sahai - Theory of Cryptography Conference, 2015 - Springer
We show the following result: Assuming the existence of p ublic-coin differing-input
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …