It is known that such protocols cannot be proven secure using black-box reductions (or simulation). Our constructions circumvent these lower bounds, utilizing AIPO (and extensions) as the ``non-black-box component" in the security reduction. We also investigate the relation between AIPO and the assumptions previously used to achieve 3-round ZK.
Category / Keywords: cryptographic protocols / Zero-Knowledge, Obfuscation, Point Obfuscation, Witness-Hiding, Date: received 11 Sep 2011, last revised 21 Sep 2011 Contact author: omer at bu edu Available formats: PDF | BibTeX Citation Version: 20110921:185422 (All versions of this report) Discussion forum: Show discussion | Start new discussion