You are looking at a specific version 20161223:164835 of this paper. See the latest version.

Paper 2015/246

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting

Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee

Abstract

We introduce \emph{implicit zero-knowledge} arguments (iZK) and simulation-sound variants thereof (SSiZK); these are lightweight alternatives to zero-knowledge arguments for enforcing semi-honest behavior. Our main technical contribution is a construction of efficient two-flow iZK and SSiZK protocols for a large class of languages under the (plain) DDH assumption in cyclic groups in the common reference string model. As an application of iZK, we improve upon the round-efficiency of existing protocols for securely computing inner product under the DDH assumption. This new protocol in turn provides privacy-preserving biometric authentication with lower latency.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in CRYPTO 2015
Keywords
hash proof systemszero-knowledgemalicious adversariestwo-party computationinner product
Contact author(s)
fabrice benhamouda @ ens fr
History
2016-12-23: last of 2 revisions
2015-03-19: received
See all versions
Short URL
https://ia.cr/2015/246
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.