Two-Round Witness Hiding Protocol

被引:0
|
作者
Niu, Qihua [1 ]
Yan, Tongjiang [1 ,2 ]
Sun, Yuhua [1 ,3 ]
Zhao, Chun'e [1 ]
Tang, Fei [4 ]
机构
[1] China Univ Petr Huadong, Coll Sci, Qingdao 266555, Shandong, Peoples R China
[2] Fujian Prov Univ, Putian Univ, Key Lab Appl Mat, Putian 351100, Fujian, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Co, Jinan, Shandong, Peoples R China
[4] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing, Peoples R China
基金
中国国家自然科学基金;
关键词
witness hiding; argument system; point obfuscation; adaptive witness encryption scheme; KNOWLEDGE PROOF SYSTEMS; INDISTINGUISHABILITY OBFUSCATION; ASSUMPTIONS; ENCRYPTION;
D O I
10.1587/transfun.E101.A.953
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.
引用
收藏
页码:953 / 960
页数:8
相关论文
共 50 条
  • [1] PriVeto: a fully private two-round veto protocol
    Bag, Samiran
    Azad, Muhammad Ajmal
    Hao, Feng
    IET INFORMATION SECURITY, 2019, 13 (04) : 311 - 320
  • [2] Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation
    Zhang, Qing
    Chen, Kaimeng
    MATHEMATICS, 2024, 12 (01)
  • [3] An optimisation for a two-round good-case latency protocol
    Hu, Kexin
    Zhang, Zhenfeng
    Guo, Kaiwen
    Jiang, Weiyu
    Li, Xiaoman
    Han, Jiang
    IET INFORMATION SECURITY, 2023, 17 (04) : 664 - 680
  • [4] A two-round honest-verifier zero-knowledge protocol
    LIU HanWu 1
    2 Graduate University of the Chinese Academy of Sciences
    ScienceChina(InformationSciences), 2010, 53 (05) : 954 - 963
  • [5] A two-round honest-verifier zero-knowledge protocol
    Liu HanWu
    Lin DongDai
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (05) : 954 - 963
  • [6] A two-round honest-verifier zero-knowledge protocol
    HanWu Liu
    DongDai Lin
    Science China Information Sciences, 2010, 53 : 954 - 963
  • [7] Two-round contributory group key exchange protocol for wireless network environments
    Tsu-Yang Wu
    Yuh-Min Tseng
    Ching-Wen Yu
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [8] Two-round contributory group key exchange protocol for wireless network environments
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [9] Nash Equilibria of Two-round Auctions
    Zhong, Chulong
    Yan, Xiang
    Wang, Yuyi
    Huang, Shuangping
    Zhong, Jin
    2023 5TH INTERNATIONAL CONFERENCE ON DISTRIBUTED ARTIFICIAL INTELLIGENCE, DAI 2023, 2023,
  • [10] Understanding two-round differentials in AES
    Daemen, Joan
    Rijmen, Vincent
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 78 - 94