Paper 2012/012

Malleable Proof Systems and Applications

Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn

Abstract

Malleability for cryptography is not necessarily an opportunity for attack, but in many cases a potentially useful feature that can be exploited. In this work, we examine notions of malleability for non-interactive zero-knowledge (NIZK) proofs. We start by defining a malleable proof system, and then consider ways to meaningfully control the malleability of the proof system, as in many settings we would like to guarantee that only certain types of transformations can be performed. We also define notions for the cases in which we do not necessarily want a user to know that a proof has been obtained by applying a particular transformation; these are analogous to function/circuit privacy for encryption. As our motivating application, we consider a shorter proof for verifiable shuffles. Our controlled-malleable proofs allow us for the first time to use one compact proof to prove the correctness of an entire multi-step shuffle. Each authority takes as input a set of encrypted votes and a controlled-malleable NIZK proof that these are a shuffle of the original encrypted votes submitted by the voters; it then permutes and re-randomizes these votes and updates the proof by exploiting its controlled malleability. As another application, we generically use controlled-malleable proofs to realize a strong notion of encryption security. Finally, we examine malleability in existing proof systems and observe that Groth-Sahai proofs are malleable. We then go beyond this observation by characterizing all the ways in which they are malleable, and use them to efficiently instantiate our generic constructions from above; this means we can instantiate our proofs and all their applications using only the Decision Linear (DLIN) assumption.

Note: 1/16: Added missing acknowledgments.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. To appear in Eurocrypt 2012.
Keywords
zero knowledgemalleability
Contact author(s)
smeiklej @ cs ucsd edu
History
2012-01-17: revised
2012-01-10: received
See all versions
Short URL
https://ia.cr/2012/012
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/012,
      author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
      title = {Malleable Proof Systems and Applications},
      howpublished = {Cryptology ePrint Archive, Paper 2012/012},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/012}},
      url = {https://eprint.iacr.org/2012/012}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.