TY - GEN
T1 - Weak Zero-Knowledge via the Goldreich-Levin Theorem
AU - Khurana, Dakshita
AU - Malavolta, Giulio
AU - Tomer, Kabir
N1 - D. Khurana and K. Tomer were supported in part by NSF CAREER CNS-2238718, DARPA SIEVE and a gift from Visa Research. This material is based upon work supported by the Defense Advanced Research Projects Agency through Award HR00112020024. G. Malavolta was funded by the Deutsche Forschungs-gemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy-EXC 2092 CASA-390781972.
PY - 2023
Y1 - 2023
N2 - Obtaining three round zero-knowledge from standard cryptographic assumptions has remained a challenging open problem. Meanwhile, there has been exciting progress in realizing useful relaxations such as weak zero-knowledge, strong witness indistinguishability and witness hiding in two or three rounds. In particular, known realizations from generic assumptions obtain: (1) security against adaptive verifiers assuming fully homomorphic encryption among other standard assumptions (Bitansky et. al., STOC 2019), and (2) security against non-adaptive verifiers in the distributional setting from oblivious transfer (Jain et. al., Crypto 2017). This work builds three round weak zero-knowledge for NP in the non-adaptive setting from doubly-enhanced injective trapdoor functions. We obtain this result by developing a new distinguisher-dependent simulation technique that makes crucial use of the Goldreich-Levin list decoding algorithm, and may be of independent interest.
AB - Obtaining three round zero-knowledge from standard cryptographic assumptions has remained a challenging open problem. Meanwhile, there has been exciting progress in realizing useful relaxations such as weak zero-knowledge, strong witness indistinguishability and witness hiding in two or three rounds. In particular, known realizations from generic assumptions obtain: (1) security against adaptive verifiers assuming fully homomorphic encryption among other standard assumptions (Bitansky et. al., STOC 2019), and (2) security against non-adaptive verifiers in the distributional setting from oblivious transfer (Jain et. al., Crypto 2017). This work builds three round weak zero-knowledge for NP in the non-adaptive setting from doubly-enhanced injective trapdoor functions. We obtain this result by developing a new distinguisher-dependent simulation technique that makes crucial use of the Goldreich-Levin list decoding algorithm, and may be of independent interest.
KW - Distinguisher
KW - Goldreich-Levin
KW - Simulation
KW - Zero-knowledge
UR - http://www.scopus.com/inward/record.url?scp=85180796925&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85180796925&partnerID=8YFLogxK
U2 - 10.1007/978-981-99-8724-5_5
DO - 10.1007/978-981-99-8724-5_5
M3 - Conference contribution
AN - SCOPUS:85180796925
SN - 9789819987238
T3 - Lecture Notes in Computer Science
SP - 142
EP - 173
BT - Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
A2 - Guo, Jian
A2 - Steinfeld, Ron
PB - Springer
T2 - 29th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023
Y2 - 4 December 2023 through 8 December 2023
ER -