Cryptology ePrint Archive: Report 2015/1112

Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles

Prastudy Fauzi and Helger Lipmaa

Abstract: One way to guarantee security against malicious voting servers is to use NIZK shuffle arguments. Up to now, only two NIZK shuffle arguments in the CRS model have been proposed. Both arguments are relatively inefficient compared to known random oracle based arguments. We propose a new, more efficient, shuffle argument in the CRS model. Importantly, its online prover's computational complexity is dominated by only two $(n + 1)$-wide multi-exponentiations, where $n$ is the number of ciphertexts. Compared to the previously fastest argument by Lipmaa and Zhang, it satisfies a stronger notion of soundness.

Category / Keywords: cryptographic protocols / Bilinear pairings, CRS model, mix-net, non-interactive zero knowledge, shuffle argument.

Date: received 16 Nov 2015, last revised 25 Nov 2015

Contact author: helger lipmaa at gmail com

Available format(s): PDF | BibTeX Citation

Note: Very minimal changes

Version: 20151125:174053 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]