Proofs of Restricted Shuffles Bjrn Terelius and Douglas Wikstrm KTH, - - PowerPoint PPT Presentation

proofs of restricted shuffles
SMART_READER_LITE
LIVE PREVIEW

Proofs of Restricted Shuffles Bjrn Terelius and Douglas Wikstrm KTH, - - PowerPoint PPT Presentation

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations Proofs of Restricted Shuffles Bjrn Terelius and Douglas Wikstrm KTH, Stockholm May 3, 2010 Bjrn Terelius and Douglas Wikstrm Proofs of Restricted Shuffles


slide-1
SLIDE 1

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proofs of Restricted Shuffles

Björn Terelius and Douglas Wikström

KTH, Stockholm

May 3, 2010

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-2
SLIDE 2

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

A motivating example: Voting

Consider a voting system where each voter submit an encrypted vote.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-3
SLIDE 3

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

A motivating example: Voting

Consider a voting system where each voter submit an encrypted vote.

◮ How can we ensure that the voters remain anonymous when

the votes are decrypted?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-4
SLIDE 4

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

A motivating example: Voting

Consider a voting system where each voter submit an encrypted vote.

◮ How can we ensure that the voters remain anonymous when

the votes are decrypted?

◮ There are two main ways to achieve this, homomorphic

tallying [CGS97] and mixnets [Cha81].

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-5
SLIDE 5

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Mixnets

MN

S1

E ( m1 )

S2

E ( m2 )

SN

E ( mN )

· · ·

mπ(1) mπ(2)

. . .

mπ(N)

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-6
SLIDE 6

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Mixnets (2)

◮ How can we implement a mixnet?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-7
SLIDE 7

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Mixnets (2)

◮ How can we implement a mixnet? ◮ Chain of mixservers, each permutes and re-encrypts its list of

inputs.

T1 T2 · · · Tk L0 L1 L2 Lk−1 Lk

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-8
SLIDE 8

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of a shuffle

◮ How can we verify that a server really permutes and

re-encrypts the votes?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-9
SLIDE 9

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of a shuffle

◮ How can we verify that a server really permutes and

re-encrypts the votes?

◮ Let each server produce an interactive zero-knowledge proof, a

proof of a shuffle [SK95, Nef01, FS01].

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-10
SLIDE 10

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of a shuffle

◮ How can we verify that a server really permutes and

re-encrypts the votes?

◮ Let each server produce an interactive zero-knowledge proof, a

proof of a shuffle [SK95, Nef01, FS01].

◮ Like [FS01], we will construct a proof that a commitment

contains a permutation matrix.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-11
SLIDE 11

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of a shuffle

◮ How can we verify that a server really permutes and

re-encrypts the votes?

◮ Let each server produce an interactive zero-knowledge proof, a

proof of a shuffle [SK95, Nef01, FS01].

◮ Like [FS01], we will construct a proof that a commitment

contains a permutation matrix.

◮ One can then prove that the encrypted votes are permuted

accordingly.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-12
SLIDE 12

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Test for permutation matrices

M permutation matrix M =   1 1 1   M not permutation matrix M =   1 2 −1 1  

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-13
SLIDE 13

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Test for permutation matrices

M permutation matrix M =   1 1 1   Mx =   x2 x1 x3   M not permutation matrix M =   1 2 −1 1   Mx =   x2 2x1 − x3 x3  

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-14
SLIDE 14

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Test for permutation matrices

M permutation matrix M =   1 1 1   Mx =   x2 x1 x3   N

i=1mi, x = x2x1x3

= x1x2x3 M not permutation matrix M =   1 2 −1 1   Mx =   x2 2x1 − x3 x3   N

i=1mi, x = x2(2x1 − x3)x3

= x1x2x3

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-15
SLIDE 15

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Test for permutation matrices

Theorem (Permutation Matrix)

Let M = (mi,j) be an N × N-matrix over Zq and x = (x1, . . . , xN) be a list of variables. Then M is a permutation matrix if and only if N

i=1mi, x =

N

i=1 xi

and M1 = 1 .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-16
SLIDE 16

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Test for permutation matrices

Theorem (Permutation Matrix)

Let M = (mi,j) be an N × N-matrix over Zq and x = (x1, . . . , xN) be a list of variables. Then M is a permutation matrix if and only if N

i=1mi, x =

N

i=1 xi

and M1 = 1 .

Lemma (Schwartz-Zippel)

Let f ∈ Zq[x1, . . . , xN] be a non-zero polynomial of total degree d and let e1, . . . , eN be chosen randomly from Zq. Then Pr[f (e1, . . . , eN) = 0] ≤ d q .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-17
SLIDE 17

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Recall Pedersen commitments

Let g, g1 be randomly chosen generators in a group of prime order

  • q. The Pedersen commitment of m ∈ Zq is

C (m, s) = gsgm

1

where s is chosen randomly from Zq.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-18
SLIDE 18

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Recall Pedersen commitments

Let g, g1 be randomly chosen generators in a group of prime order

  • q. The Pedersen commitment of m ∈ Zq is

C (m, s) = gsgm

1

where s is chosen randomly from Zq.

◮ perfectly hiding ◮ computationally binding ◮ homomorphic, C (m, s) C (m′, s′) = C (m + m′, s + s′)

C (m, s)e = C (em, es)

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-19
SLIDE 19

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Generalized Pedersen commitments [FS01]

Let g, g1, . . . , gN be randomly chosen generators in a group of prime order q. We commit to a vector m = (m1, . . . , mN)T by C (m, s) = gs

N

  • i=1

gmi

i

where s is chosen randomly from Zq.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-20
SLIDE 20

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Generalized Pedersen commitments [FS01]

Let g, g1, . . . , gN be randomly chosen generators in a group of prime order q. We commit to a vector m = (m1, . . . , mN)T by C (m, s) = gs

N

  • i=1

gmi

i

where s is chosen randomly from Zq.

◮ perfectly hiding ◮ computationally binding ◮ homomorphic, C (m, s) C (m′, s′) = C (m + m′, s + s′)

C (m, s)e = C (em, es)

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-21
SLIDE 21

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Generalized Pedersen commitments

We commit column-wise to an N × N-matrix M = (mi,j), so a = C (M, s) is a list of N commitments satisfying C (M, s)e = C (Me, s, e) where we use the convention ae = N

i=1 aei i

.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-22
SLIDE 22

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

A review of sigma proofs

A sigma proof is a three-message protocol such that

  • 1. the view of the verifier can be simulated for any given challenge

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-23
SLIDE 23

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

A review of sigma proofs

A sigma proof is a three-message protocol such that

  • 1. the view of the verifier can be simulated for any given challenge
  • 2. a witness can be computed from any pair of accepting

transcripts with the same random tape and distinct challenges

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-24
SLIDE 24

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Example: Proof of knowledge of discrete logarithm

P wants to prove knowledge of x such that y = gx

  • 1. P chooses r at random and sends α = gr
  • 2. V sends a random challenge c
  • 3. P responds with d = cx + r

V accepts the proof iff ycα = gd

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-25
SLIDE 25

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Example: Proof of knowledge of discrete logarithm

P wants to prove knowledge of x such that y = gx

  • 1. P chooses r at random and sends α = gr
  • 2. V sends a random challenge c
  • 3. P responds with d = cx + r

V accepts the proof iff ycα = gd There are similar protocols for proving any polynomial relation!

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-26
SLIDE 26

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of knowledge of permutation matrix

Given a matrix commitment a, P wants to prove knowledge of a permutation matrix M and randomness s such that a = C (M, s).

  • 1. V chooses a vector e randomly and sends it to P.
  • 2. P uses a sigma proof to prove knowledge of t, k and a vector

e′ such that C (e′, k) = ae C

  • 1, t
  • = a1

N

i=1 e′ i = N i=1 ei

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-27
SLIDE 27

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Proof of knowledge of permutation matrix

Given a matrix commitment a, P wants to prove knowledge of a permutation matrix M and randomness s such that a = C (M, s).

  • 1. V chooses a vector e randomly and sends it to P.
  • 2. P uses a sigma proof to prove knowledge of t, k and a vector

e′ such that C (e′, k) = ae C

  • 1, t
  • = a1

N

i=1 e′ i = N i=1 ei

e′ = Me 1 = M1 N

i=1mi, e = N i=1 ei

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-28
SLIDE 28

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Properties of the protocol

Theorem

The protocol is a honest verifier zero knowledge proof of knowledge

  • f a permutation matrix M such that a = C (M, s), assuming the

commitment scheme is binding.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-29
SLIDE 29

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Properties of the protocol

Theorem

The protocol is a honest verifier zero knowledge proof of knowledge

  • f a permutation matrix M such that a = C (M, s), assuming the

commitment scheme is binding.

◮ The zero-knowledge property is easy.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-30
SLIDE 30

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Properties of the protocol

Theorem

The protocol is a honest verifier zero knowledge proof of knowledge

  • f a permutation matrix M such that a = C (M, s), assuming the

commitment scheme is binding.

◮ The zero-knowledge property is easy. ◮ We must construct an extractor which computes a

permutation matrix from accepting transcripts.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-31
SLIDE 31

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof

  • 1. Run the extractor of the sigma proof N times with e1, . . . , eN,

each time extracting e′

i and ki such that C (e′ i, ki) = aei.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-32
SLIDE 32

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof

  • 1. Run the extractor of the sigma proof N times with e1, . . . , eN,

each time extracting e′

i and ki such that C (e′ i, ki) = aei.

  • 2. The random vectors are linearly independent with probability

at least 1 − N/q.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-33
SLIDE 33

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof

  • 1. Run the extractor of the sigma proof N times with e1, . . . , eN,

each time extracting e′

i and ki such that C (e′ i, ki) = aei.

  • 2. The random vectors are linearly independent with probability

at least 1 − N/q.

  • 3. Linear independence implies existence of αℓ,j ∈ Zq such that

N

j=1 αℓ,jej is the ℓth standard unit vector in ZN q .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-34
SLIDE 34

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof

  • 1. Run the extractor of the sigma proof N times with e1, . . . , eN,

each time extracting e′

i and ki such that C (e′ i, ki) = aei.

  • 2. The random vectors are linearly independent with probability

at least 1 − N/q.

  • 3. Linear independence implies existence of αℓ,j ∈ Zq such that

N

j=1 αℓ,jej is the ℓth standard unit vector in ZN q .

  • 4. Then N

j=1 αℓ,je′ j is the ℓth column in M

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-35
SLIDE 35

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof

  • 1. Run the extractor of the sigma proof N times with e1, . . . , eN,

each time extracting e′

i and ki such that C (e′ i, ki) = aei.

  • 2. The random vectors are linearly independent with probability

at least 1 − N/q.

  • 3. Linear independence implies existence of αℓ,j ∈ Zq such that

N

j=1 αℓ,jej is the ℓth standard unit vector in ZN q .

  • 4. Then N

j=1 αℓ,je′ j is the ℓth column in M since

al =

N

  • j=1

aαℓ,jej =

N

  • j=1

C

  • e′

j, kj

αℓ,j = C  

N

  • j=1

αℓ,je′

j, N

  • j=1

αℓ,jkj  

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-36
SLIDE 36

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof (2)

What if the extracted matrix M isn’t a permutation matrix?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-37
SLIDE 37

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof (2)

What if the extracted matrix M isn’t a permutation matrix?

  • 1. If M1 = 1 then

C

  • 1, t
  • = a1 = C
  • M1, s, 1
  • Björn Terelius and Douglas Wikström

Proofs of Restricted Shuffles

slide-38
SLIDE 38

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof (2)

What if the extracted matrix M isn’t a permutation matrix?

  • 1. If M1 = 1 then

C

  • 1, t
  • = a1 = C
  • M1, s, 1
  • 2. If N

i=1mi, x = N i=1 xi

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-39
SLIDE 39

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof (2)

What if the extracted matrix M isn’t a permutation matrix?

  • 1. If M1 = 1 then

C

  • 1, t
  • = a1 = C
  • M1, s, 1
  • 2. If N

i=1mi, x = N i=1 xi then we invoke the extractor to get

e, e′ and k satisfying N

i=1mi, e = N i=1 ei.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-40
SLIDE 40

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Sketch of proof (2)

What if the extracted matrix M isn’t a permutation matrix?

  • 1. If M1 = 1 then

C

  • 1, t
  • = a1 = C
  • M1, s, 1
  • 2. If N

i=1mi, x = N i=1 xi then we invoke the extractor to get

e, e′ and k satisfying N

i=1mi, e = N i=1 ei. Observe that

C

  • e′, k
  • = ae = C (Me, s, e)

but e′ = Me.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-41
SLIDE 41

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation

Given that we can prove that a committed matrix is a permutation matrix, what other properties can we prove about the permutation?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-42
SLIDE 42

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation

Given that we can prove that a committed matrix is a permutation matrix, what other properties can we prove about the permutation? For example, can we prove that the permutation is a rotation [RW04, dHSSV09]?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-43
SLIDE 43

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation

Given that we can prove that a committed matrix is a permutation matrix, what other properties can we prove about the permutation? For example, can we prove that the permutation is a rotation [RW04, dHSSV09]? A rotation is precisely an automorphism of the directed cycle graph!

1 2 3 4 5

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-44
SLIDE 44

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation

Given that we can prove that a committed matrix is a permutation matrix, what other properties can we prove about the permutation? For example, can we prove that the permutation is a rotation [RW04, dHSSV09]? Let us look at the undirected cycle instead.

1 2 3 4 5

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-45
SLIDE 45

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (graphs)

◮ Let G be a graph with vertices V = {1, 2, 3, . . . , N}. Encode

the edge set as FG (x1, . . . , xN) =

  • (i,j)∈E

xixj .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-46
SLIDE 46

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (graphs)

◮ Let G be a graph with vertices V = {1, 2, 3, . . . , N}. Encode

the edge set as FG (x1, . . . , xN) =

  • (i,j)∈E

xixj .

◮ A permutation π is an automorphism of G if and only if

FG (x1, . . . , xN) = FG (xπ(1), . . . , xπ(N)) .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-47
SLIDE 47

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (graphs)

◮ Let G be a graph with vertices V = {1, 2, 3, . . . , N}. Encode

the edge set as FG (x1, . . . , xN) =

  • (i,j)∈E

xixj .

◮ A permutation π is an automorphism of G if and only if

FG (x1, . . . , xN) = FG (xπ(1), . . . , xπ(N)) .

◮ Apply Schwartz-Zippel . . .

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-48
SLIDE 48

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (directed graphs)

We can encode not only graphs, but also

◮ directed graphs ◮ labeled graphs ◮ hypergraphs ◮ etc.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-49
SLIDE 49

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (directed graphs)

We can encode not only graphs, but also

◮ directed graphs ◮ labeled graphs ◮ hypergraphs ◮ etc.

Returning to the rotation example, use the encoding polynomial FG (x1, . . . , xN) =

  • (i,j)∈E

xix2

j

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-50
SLIDE 50

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (directed graphs)

We can encode not only graphs, but also

◮ directed graphs ◮ labeled graphs ◮ hypergraphs ◮ etc.

Returning to the rotation example, use the encoding polynomial FG (x1, . . . , xN) =

  • (i,j)∈E

xix2

j = x1x2 2 + x2x2 3 + x3x2 4 + x4x2 5 + x5x2 1

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-51
SLIDE 51

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (directed graphs)

We can encode not only graphs, but also

◮ directed graphs ◮ labeled graphs ◮ hypergraphs ◮ etc.

Returning to the rotation example, use the encoding polynomial FG (x1, . . . , xN) =

  • (i,j)∈E

xix2

j = x1x2 2 + x2x2 3 + x3x2 4 + x4x2 5 + x5x2 1

Testing FG (x1, . . . , xN) = FG (xπ(1), . . . , xπ(N)) determines whether π is a rotation.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-52
SLIDE 52

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Restricting the permutation (polynomials)

Theorem

Let F be any polynomial in Zq[x1, . . . , xN] and let SF be the group

  • f permutations π such that

F(x1, . . . , xN) = F(xπ(1), . . . , xπ(N)) . Then we can prove that the permutation is chosen from SF.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-53
SLIDE 53

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Summary

We have demonstrated

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-54
SLIDE 54

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Summary

We have demonstrated

◮ an efficient proof of a shuffle with a simple analysis

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-55
SLIDE 55

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Summary

We have demonstrated

◮ an efficient proof of a shuffle with a simple analysis ◮ a general method for restricting the permutation to certain

groups

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-56
SLIDE 56

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Summary

We have demonstrated

◮ an efficient proof of a shuffle with a simple analysis ◮ a general method for restricting the permutation to certain

groups Problem Are there applications for other restrictions than rotations, e.g. automorphisms of a complete binary tree?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-57
SLIDE 57

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

Questions?

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-58
SLIDE 58

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

References I

  • R. Cramer, R. Gennaro, and B. Schoenmakers.

A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology – Eurocrypt ’97, volume 1233 of Lecture Notes in Computer Science, pages 103–118. Springer Verlag, 1997.

  • D. Chaum.

Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM, 24(2):84–88, 1981.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-59
SLIDE 59

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

References II

  • S. de Hoogh, B. Schoenmakers, B. Skoric, and J. Villegas.

Verifiable rotation of homomorphic encryptions. In Public Key Cryptography – PKC 2009, volume 5443 of Lecture Notes in Computer Science, pages 393–410. Springer Verlag, 2009.

  • J. Furukawa and K. Sako.

An efficient scheme for proving a shuffle. In Advances in Cryptology – Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 368–387. Springer Verlag, 2001.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-60
SLIDE 60

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

References III

  • A. Neff.

A verifiable secret shuffle and its application to e-voting. In 8th ACM Conference on Computer and Communications Security (CCS), pages 116–125. ACM Press, 2001.

  • M. K. Reiter and X. Wang.

Fragile mixing. In 11th ACM Conference on Computer and Communications Security (CCS), pages 227–235. ACM Press, 2004.

  • K. Sako and J. Killian.

Reciept-free mix-type voting scheme. In Advances in Cryptology – Eurocrypt ’95, volume 921 of Lecture Notes in Computer Science, pages 393–403. Springer Verlag, 1995.

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles

slide-61
SLIDE 61

Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations

References IV

Björn Terelius and Douglas Wikström Proofs of Restricted Shuffles