Paper 2012/279

Concurrent Zero Knowledge in the Bounded Player Model

Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, and Ivan Visconti


In this paper, we put forward the Bounded Player Model for secure computation. In this new model, the number of players that will ever be involved in secure computations is bounded, but the number of computations has no a priori bound. Indeed, while the number of devices and people on this planet can be realistically estimated and bounded, the number of computations these devices will run can not be realistically bounded. We stress that in the Bounded Player model}, in addition to no a priori bound on the number of sessions, there is no synchronization barrier, no trusted party, and simulation must be performed in polynomial time. In this setting, we achieve concurrent Zero Knowledge (cZK) with sub-logarithmic round complexity. Our security proof is (necessarily) non-black-box, our simulator is "straight-line" and works as long as the number of rounds is \omega(1). We further show that unlike previously studied relaxations of the standard model (e.g., bounded number of sessions, timing assumptions, super-polynomial simulation), concurrent-secure computation is still impossible to achieve in the Bounded Player model. This gives evidence that our model is "closer" to the standard model than previously studied models, and study of this model might shed light on constructing round efficient concurrent zero-knowledge in the standard model as well.

Note: 31/05/12 Updated acknowledgements.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
concurrent zero knowledge
Contact author(s)
ivan visconti @ gmail com
2012-09-01: last of 2 revisions
2012-05-29: received
See all versions
Short URL
Creative Commons Attribution


      author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti},
      title = {Concurrent Zero Knowledge in the Bounded Player Model},
      howpublished = {Cryptology ePrint Archive, Paper 2012/279},
      year = {2012},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.