Characterizing Deterministic- Prover Zero Knowledge Nir Bitansky - - PowerPoint PPT Presentation

โ–ถ
characterizing deterministic
SMART_READER_LITE
LIVE PREVIEW

Characterizing Deterministic- Prover Zero Knowledge Nir Bitansky - - PowerPoint PPT Presentation

Characterizing Deterministic- Prover Zero Knowledge Nir Bitansky Arka Rai Choudhuri Tel Aviv University Johns Hopkins University Zero Knowledge [Goldwasser-Micali- Rackoff85] $ $ $ $ $ $ Prover (, ) Verifier () Zero Knowledge


slide-1
SLIDE 1

Characterizing Deterministic- Prover Zero Knowledge

Nir Bitansky

Tel Aviv University

Arka Rai Choudhuri

Johns Hopkins University

slide-2
SLIDE 2

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

slide-3
SLIDE 3

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

Completeness: โˆ€๐‘ฆ โˆˆ โ„’, verifier accepts. (Computational) Soundness Zero Knowledge

slide-4
SLIDE 4

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

Completeness (Computational) Soundness: โˆ€๐‘ฆ โˆ‰ โ„’, no PPT prover can make the verifier accept. Zero Knowledge

slide-5
SLIDE 5

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

Completeness (Computational) Soundness Zero Knowledge: โˆ€ Verifiers โˆƒ Simulator

slide-6
SLIDE 6

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

$ $ $ $ $ $

Prover (๐‘ฆ, ๐‘ฅ)

Verifierโ€™s view in an execution with the prover

Completeness (Computational) Soundness Zero Knowledge: โˆ€ Verifiers โˆƒ Simulator

slide-7
SLIDE 7

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

Completeness (Computational) Soundness Zero Knowledge: โˆ€ Verifiers โˆƒ Simulator

$ $ $ $ $ $

Verifierโ€™s view in an execution with the prover

slide-8
SLIDE 8

Zero Knowledge [Goldwasser-Micali-Rackoffโ€™85]

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

$ $ $ $ $ $

Completeness (Computational) Soundness Zero Knowledge: โˆ€ Verifiers โˆƒ Simulator

$ $ $ $ $ $ $ $ $ $ $ $

Verifierโ€™s view in an execution with the prover Simulatorโ€™s output on input ๐‘ฆ

โ‰ˆ

slide-9
SLIDE 9

Many Flavors of Zero-Knowledge (ZK)

โˆ€ Verifier โˆƒ Simulator GMR ZK

View (๐‘ฆ)

โ‰ˆ

slide-10
SLIDE 10

Many Flavors of Zero-Knowledge (ZK)

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

slide-11
SLIDE 11

Many Flavors of Zero-Knowledge (ZK)

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

slide-12
SLIDE 12

Deterministic Prover Zero Knowledge (DPZK)

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

slide-13
SLIDE 13

Deterministic Prover Zero Knowledge (DPZK)

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

Is prover randomness essential for zero knowledge?

slide-14
SLIDE 14

Limitations of DPZK [Golreich-Orenโ€™94]

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

slide-15
SLIDE 15

Limitations of DPZK [Golreich-Orenโ€™94]

Impossible for non-trivial languages.

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

slide-16
SLIDE 16

Prior Work

[Faonio-Nielsen-Venturiโ€™17]

Witness encryption for โ„’ โŸน Honest-verifier DPZK for โ„’ Hash proof system for โ„’ โŸน Honest-verifier DPZK proofs for โ„’

[Dahari-Lindellโ€™20]

Doubly enhanced injective OWFs โŸน Honest-verifier DPZK proofs for NP

Inefficient honest prover.

Malicious-verifier DPZK for languages that have an entropy guarantee from witnesses.

slide-17
SLIDE 17

Prior Work

[Faonio-Nielsen-Venturiโ€™17]

Witness encryption for โ„’ โŸน Honest-verifier DPZK for โ„’ Hash proof system for โ„’ โŸน Honest-verifier DPZK proofs for โ„’

[Dahari-Lindellโ€™20]

Doubly enhanced injective OWFs โŸน Honest-verifier DPZK proofs for NP

Inefficient honest prover.

Malicious-verifier DPZK for languages that have an entropy guarantee from witnesses.

slide-18
SLIDE 18

Our Results

Impossible for non-trivial languages.

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

slide-19
SLIDE 19

Our Results

Impossible for non-trivial languages.

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

๐‘-Bounded auxiliary-input ZK โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 ๐‘

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

slide-20
SLIDE 20

Our Results

Impossible for non-trivial languages.

โˆ€ Verifier โˆƒ Simulator GMR ZK Auxiliary-input ZK Black-box ZK

View (๐‘ฆ)

โ‰ˆ

โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 โˆ—

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

โˆƒ Simulator โˆ€ Verifier

View (๐‘ฆ)

โ‰ˆ

๐‘-Bounded auxiliary-input ZK โˆ€ Verifier โˆƒ Simulator โˆ€ aux-IP ๐‘จ โˆˆ 0,1 ๐‘

View (๐‘ฆ, ๐‘จ)

โ‰ˆ

slide-21
SLIDE 21

Our Results

Assuming NIWIs + sub-exponentially secure iO + OWF, there exist two message DPZK arguments for NP โˆฉ coNP against bounded auxiliary-input verifiers. Also assuming sub-exponentially secure keyless CRHF, there exist two message DPZK arguments for all of NP against bounded auxiliary-input verifiers.

slide-22
SLIDE 22

Our Results

Assuming NIWIs + sub-exponentially secure iO + OWF, there exist two message DPZK arguments for NP โˆฉ coNP against bounded auxiliary-input verifiers. Also assuming sub-exponentially secure keyless CRHF, there exist two message DPZK arguments for all of NP against bounded auxiliary-input verifiers. Any DPZK argument for a language โ„’ implies a witness encryption for โ„’.

slide-23
SLIDE 23

Two Message DPZK Arguments

slide-24
SLIDE 24

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

slide-25
SLIDE 25

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Witness Encryption for โ„’

WE.Enc

๐‘ฆ ๐‘› ct๐‘ฆ,๐‘›

WE.Dec

๐‘ฅ ๐‘›/โŠฅ ct๐‘ฆ,๐‘› Deterministic Decryption

slide-26
SLIDE 26

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Witness Encryption for โ„’

WE.Enc

๐‘ฆ ๐‘› ct๐‘ฆ,๐‘›

WE.Dec

๐‘ฅ ๐‘›/โŠฅ ct๐‘ฆ,๐‘›

For ๐‘ฆ, ๐‘ฅ โˆˆ Relโ„’

WE.Dec

๐‘ฅ ๐‘› ct๐‘ฆ,๐‘›

Correctness

Deterministic Decryption

slide-27
SLIDE 27

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Witness Encryption for โ„’

WE.Enc

๐‘ฆ ๐‘› ct๐‘ฆ,๐‘›

WE.Dec

๐‘ฅ ๐‘›/โŠฅ ct๐‘ฆ,๐‘›

For ๐‘ฆ, ๐‘ฅ โˆˆ Relโ„’ For ๐‘ฆ โˆ‰ โ„’

ct๐‘ฆ,0 ct๐‘ฆ,1

โ‰ˆ

WE.Dec

๐‘ฅ ๐‘› ct๐‘ฆ,๐‘›

Correctness Security

Deterministic Decryption

slide-28
SLIDE 28

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

slide-29
SLIDE 29

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ)

ct๐‘ฆ,๐‘ฃ

slide-30
SLIDE 30

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

slide-31
SLIDE 31

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

Completeness: From correctness of WE.

slide-32
SLIDE 32

Cheating Prover (๐‘ฆ) Verifier (๐‘ฆ) ct๐‘ฆ,๐‘ฃ เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Completeness Soundness: From WE security when ๐‘ฆ โˆ‰ โ„’

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ)

slide-33
SLIDE 33

Cheating Prover (๐‘ฆ) Verifier (๐‘ฆ) ct๐‘ฆ,0 ?

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Completeness Soundness: From WE security when ๐‘ฆ โˆ‰ โ„’

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ)

slide-34
SLIDE 34

Simulator (๐‘ฆ)

Honest Verifier DPZK [Faonio-Nielsen-Venturiโ€™17]

Verifier (๐‘ฆ) ct๐‘ฆ,๐‘ฃ เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

Completeness Soundness Honest Verifier Zero Knowledge: Simulator knows ๐‘ฃ

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ)

slide-35
SLIDE 35

Explainable Verifier DPZK

Explainable Verifier There exist honest verifier coins that explains verifier messages as honest messages.

Unlike related notion of semi-malicious adversaries, these coins may be hard to find.

slide-36
SLIDE 36

Explainable Verifier DPZK

Explainable Verifier There exist honest verifier coins that explains verifier messages as honest messages.

Simulator no longer โ€œknowsโ€™โ€™ the message that an explainable verifier encrypts via the Witness Encryption.

Aux-I/P DPZK for explainable verifiers also ruled out by [Goldreich-Orenโ€™94]

Unlike related notion of semi-malicious adversaries, these coins may be hard to find.

slide-37
SLIDE 37

Explainable Verifier DPZK

Explainable Verifier There exist honest verifier coins that explains verifier messages as honest messages.

Simulator no longer โ€œknowsโ€™โ€™ the message that an explainable verifier encrypts via the Witness Encryption.

Aux-I/P DPZK for explainable verifiers also ruled out by [Goldreich-Orenโ€™94]

Idea: Use additional trapdoor statement that only the simulator can use.

Unlike related notion of semi-malicious adversaries, these coins may be hard to find.

slide-38
SLIDE 38

Explainable Verifier DPZK

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input

slide-39
SLIDE 39

Explainable Verifier DPZK

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input

๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ)

๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡

slide-40
SLIDE 40

Explainable Verifier DPZK

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input

๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ)

๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡

slide-41
SLIDE 41

Explainable Verifier DPZK

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input

๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ)

๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡

Completeness: Same as HVZK

slide-42
SLIDE 42

Explainable Verifier DPZK

Cheating Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input ๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡

Completeness Soundness: w.h.p. no short machine exists to satisfy Rel แˆš

โ„’

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) ๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ)

slide-43
SLIDE 43

Explainable Verifier DPZK

Simulator (๐‘ฆ) Verifier (๐‘ฆ)

เทค ๐‘ฃ โ‰” เทซ WE.Dec(เทฅ ct๐‘†,๐‘ฃ , )

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input ๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡

Completeness Soundness Zero Knowledge: Simulator uses the verifierโ€™s code as

witness; verifierโ€™s randomness simulated by a PRG.

๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ) ๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ)

slide-44
SLIDE 44

๐‘† โŸต 0,1 ๐‘‚ เทฅ ct๐‘†,๐‘ฃ โŸต เทซ WE.Enc๐‘†(๐‘ฃ) ๐‘ฃ โŸต 0,1 ๐‘œ ct๐‘ฆ,๐‘ฃ โŸต WE.Enc๐‘ฆ(๐‘ฃ)

Explainable Verifier DPZK

Deterministic Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

เทค ๐‘ฃ โ‰” WE.Dec(ct๐‘ฆ,๐‘ฃ, ๐‘ฅ)

ct๐‘ฆ,๐‘ฃ เทฅ ct๐‘†,๐‘ฃ ๐‘† เทค ๐‘ฃ

Output 1 iff ๐‘ฃ = เทค ๐‘ฃ

size โ‰ค ๐‘

includes auxiliary input ๐‘‚ โ‰ซ ๐‘ ๐‘†, M โˆˆ Rel แˆš

โ„’ if

1) M is a Turing Machine that outputs ๐‘†. 2) Size of M is ๐‘ + ๐œ‡ Rel แˆš

โ„’ is not an NP relation since we do not a priori bound the running

time of M. Efficient Witness Encryption for Rel แˆš

โ„’ can be realized assuming

indistinguishability obfuscation for Turing Machines.

slide-45
SLIDE 45

Malicious Verifier DPZK

Malicious Verifier DPZK Explainable Verifier DPZK Verifier proves honest behavior

slide-46
SLIDE 46

Malicious Verifier DPZK

Malicious Verifier DPZK Explainable Verifier DPZK Verifier proves honest behavior

โ„’ โˆˆ NP โˆฉ coNP

Verifier proves via NIWI that

  • 1. It behaved honestly; OR

2. ๐‘ฆ โˆ‰ โ„’

slide-47
SLIDE 47

Malicious Verifier DPZK

Malicious Verifier DPZK Explainable Verifier DPZK Verifier proves honest behavior

โ„’ โˆˆ NP โˆฉ coNP

Verifier proves via NIWI that

  • 1. It behaved honestly; OR

2. ๐‘ฆ โˆ‰ โ„’

โ„’ โˆˆ NP

Verifier proves via NIWI that

  • 1. It behaved honestly; OR
  • 2. It has committed to a collision of keyless

CRHF.

slide-48
SLIDE 48

Necessity of Witness Encryption for DPZK

slide-49
SLIDE 49

Predictable Arguments (PA)

[Faonio-Nielsen-Venturiโ€™17]

๐‘ค1

Prover (๐‘ฆ) Verifier (๐‘ฆ)

๐‘ค1, ๐‘ž1 โŸต ๐‘Š(๐‘ฆ) Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1

slide-50
SLIDE 50

Predictable Arguments (PA)

[Faonio-Nielsen-Venturiโ€™17]

๐‘ค1

Prover (๐‘ฆ) Verifier (๐‘ฆ)

๐‘ค1, ๐‘ž1 โŸต ๐‘Š(๐‘ฆ) Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1 ๐‘ค2, ๐‘ž2 โŸต ๐‘Š(๐‘ฆ, ๐‘ค1, ๐‘ž1) ๐‘ค2 Reject if เทค ๐‘ž2 โ‰  ๐‘ž2 เทค ๐‘ž2

โ‹ฎ

slide-51
SLIDE 51

Predictable Arguments (PA)

[Faonio-Nielsen-Venturiโ€™17]

๐‘ค1

Prover (๐‘ฆ) Verifier (๐‘ฆ)

๐‘ค1, ๐‘ž1, โ€ฆ , ๐‘คโ„“, ๐‘žโ„“ โŸต ๐‘Š(๐‘ฆ) Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1 ๐‘ค2 Reject if เทค ๐‘ž2 โ‰  ๐‘ž2 เทค ๐‘ž2

โ‹ฎ

slide-52
SLIDE 52

Predictable Arguments (PA)

[Faonio-Nielsen-Venturiโ€™17]

๐ผ = ๐œŒ(๐ป๐‘)

Prover (๐ป0, ๐ป1) Verifier (๐ป0, ๐ป1)

๐‘ โŸต {0,1}, ๐œŒ โŸต ฮ ๐‘œ Reject if เทจ ๐‘ โ‰  ๐‘ เทจ ๐‘

Predictable argument for Graph Non- Isomorphism

slide-53
SLIDE 53

DPZK to WE

Predictable Argument for โ„’ Witness Encryption for โ„’ [Faonio-Nielsen-Venturiโ€™17]

slide-54
SLIDE 54

DPZK to WE

Predictable Argument for โ„’ Witness Encryption for โ„’ [Faonio-Nielsen-Venturiโ€™17] DPZK Argument for โ„’

slide-55
SLIDE 55

DPZK to PA

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ค1 Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1 ๐‘ค2 Reject if เทค ๐‘ž2 โ‰  ๐‘ž2 เทค ๐‘ž2

โ‹ฎ

๐‘ค1, ๐‘ž1, โ€ฆ , ๐‘คโ„“, ๐‘žโ„“; ๐‘  โŸต (๐‘ฆ)

Verifier rejects if HVZK simulator does not produce accepting transcript

Behaves identically to the DPZK prover

slide-56
SLIDE 56

DPZK to PA

Prover (๐‘ฆ, ๐‘ฅ) Verifier (๐‘ฆ)

๐‘ค1 Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1 ๐‘ค2 Reject if เทค ๐‘ž2 โ‰  ๐‘ž2 เทค ๐‘ž2

โ‹ฎ

๐‘ค1, ๐‘ž1, โ€ฆ , ๐‘คโ„“, ๐‘žโ„“; ๐‘  โŸต (๐‘ฆ)

Verifier rejects if HVZK simulator does not produce accepting transcript

Completeness: From the ZK property, the simulator and (real) DPZK

prover generate the same messages.

Behaves identically to the DPZK prover

slide-57
SLIDE 57

DPZK to PA

Cheating Prover (๐‘ฆ) Verifier (๐‘ฆ)

๐‘ค1 Reject if เทค ๐‘ž1 โ‰  ๐‘ž1 เทค ๐‘ž1 ๐‘ค2 Reject if เทค ๐‘ž2 โ‰  ๐‘ž2 เทค ๐‘ž2

โ‹ฎ

๐‘ค1, ๐‘ž1, โ€ฆ , ๐‘คโ„“, ๐‘žโ„“; ๐‘  โŸต (๐‘ฆ)

Verifier rejects if HVZK simulator does not produce accepting transcript

Completeness Soundness: If the verifier does not reject, the cheating prover generates

an accepting transcript when ๐‘ฆ โˆ‰ โ„’, breaking soundness of the ZK protocol.*

*implicitly assumed that simulated random coins are pseudorandom when ๐‘ฆ โˆ‰ โ„’.

slide-58
SLIDE 58

Other Results

Any DPZK argument for bounded auxiliary input verifiers can be made two message, and laconic in the prover message.

Follows from the transformation on predictable arguments in [Faonio-Nielsen-Venturiโ€™17]. We show that the transformations preserve zero-knowledge.

slide-59
SLIDE 59

There exist two message DPZK arguments for all of NP against bounded auxiliary-input verifiers. Any DPZK argument for a language โ„’ implies a witness encryption for โ„’.

slide-60
SLIDE 60

Thank you. Questions?

Arka Rai Choudhuri achoud@cs.jhu.edu

ia.cr/2020/1160

There exist two message DPZK arguments for all of NP against bounded auxiliary-input verifiers. Any DPZK argument for a language โ„’ implies a witness encryption for โ„’.