Paper 1999/023
Concurrent Zero-Knowledge
Cynthia Dwork, Moni Naor, and Amit Sahai
Abstract
One of the toughest challenges in designing
cryptographic protocols is to design them so that they will remain
secure even when composed. For example, concurrent executions of a
zero-knowledge protocol by a single prover (with one or more
verifiers) may leak information and may not be zero-knowledge in
toto. In this work we:
(1) Suggest time as a mechanism to design concurrent cryptographic
protocols and in particular maintaining zero-knowledge under
concurrent execution.
(2) Introduce the notion of of Deniable Authentication
and connect it to the problem of concurrent zero-knowledge.
We do not assume global synchronization, however we assume an
(alpha,beta) timing constraint: for any two processors
Metadata
- Available format(s)
- PS
- Publication info
- Published elsewhere. Appeared in the THEORY OF CRYPTOGRAPHY LIBRARY and has been included in the ePrint Archive.
- Keywords
- Zero-KnowledgeConcurrent Zero-KnowledgeConcurrencyDeniable AuthenticationNon-Malleability.
- Contact author(s)
- naor @ wisdom weizmann ac il
- History
- 1999-11-22: received
- Short URL
- https://ia.cr/1999/023
- License
-
CC BY
BibTeX
@misc{cryptoeprint:1999/023, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, title = {Concurrent Zero-Knowledge}, howpublished = {Cryptology {ePrint} Archive, Paper 1999/023}, year = {1999}, url = {https://eprint.iacr.org/1999/023} }