Two-Round Witness Hiding Protocol

被引:0
|
作者
Niu, Qihua [1 ]
Yan, Tongjiang [1 ,2 ]
Sun, Yuhua [1 ,3 ]
Zhao, Chun'e [1 ]
Tang, Fei [4 ]
机构
[1] China Univ Petr Huadong, Coll Sci, Qingdao 266555, Shandong, Peoples R China
[2] Fujian Prov Univ, Putian Univ, Key Lab Appl Mat, Putian 351100, Fujian, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Co, Jinan, Shandong, Peoples R China
[4] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing, Peoples R China
基金
中国国家自然科学基金;
关键词
witness hiding; argument system; point obfuscation; adaptive witness encryption scheme; KNOWLEDGE PROOF SYSTEMS; INDISTINGUISHABILITY OBFUSCATION; ASSUMPTIONS; ENCRYPTION;
D O I
10.1587/transfun.E101.A.953
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.
引用
收藏
页码:953 / 960
页数:8
相关论文
共 50 条
  • [31] Minimizing the Two-Round Even-Mansour Cipher
    Chen, Shan
    Lampe, Rodolphe
    Lee, Jooyoung
    Seurin, Yannick
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 39 - 56
  • [32] Two-Round Oblivious Transfer from CDH or LPN
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Masny, Daniel
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 768 - 797
  • [33] Composite Toffoli gate with two-round error detection
    Jones, Cody
    PHYSICAL REVIEW A, 2013, 87 (05):
  • [34] Two-round Multi-Party Contract Signing
    Li, Xiangdong
    Zheng, Qiusheng
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 486 - 489
  • [35] Cryptanalysis of two-round DES using genetic algorithms
    Song, Jun
    Zhang, Huanguo
    Meng, Qingshu
    Wang, Zhangyi
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2007, 4683 : 583 - +
  • [36] Quantum attacks on two-round even-mansour
    Cai, BinBin
    Gao, Fei
    Leander, Gregor
    FRONTIERS IN PHYSICS, 2022, 10
  • [37] Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round
    Zhao, X.
    Feng, D.
    IET INFORMATION SECURITY, 2010, 4 (03) : 167 - 184
  • [38] Voter Beliefs and Strategic Voting in Two-Round Elections
    Plutowski, Luke
    Weitz-Shapiro, Rebecca
    Winters, Matthew S.
    POLITICAL RESEARCH QUARTERLY, 2021, 74 (04) : 852 - 865
  • [39] Strategic Vote Choice in One-round and Two-round Elections: An Experimental Study
    Blais, Andre
    Labbe-St-Vincent, Simon
    Laslier, Jean-Francois
    Sauger, Nicolas
    Van der Straeten, Karine
    POLITICAL RESEARCH QUARTERLY, 2011, 64 (03) : 637 - 645
  • [40] Two-Round Oblivious Linear Evaluation from Learning with Errors
    Branco, Pedro
    Doettling, Nico
    Mateus, Paulo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 379 - 408