U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Presentation

Sometimes You Can’t Distribute Random-Oracle-Based Proofs

September 27, 2023

Presenters

Jack Doerner - Technion (Israel)

Description

Abstract. In this talk, we discuss the conditions under which straight-line extractable non-interactive zero knowledge proofs (NIZKs) in the random oracle model (i.e. without a common reference string) permit threshold realizations that are black-box in the same random oracle. We show that even in the semi-honest setting, any secure protocol to compute such a NIZK cannot make black-box use of the random oracle or a hash function instantiating it if security against all-but-one corruptions is desired, unless the size of the NIZK grows with the number of parties. This presents a fundamental barrier to constructing efficient protocols to securely distribute the computation of NIZKs (and signatures) based on MPC-in-the-head, PCPs/IOPs, and sigma protocols compiled with transformations due to Fischlin, Pass, or Unruh.

When the adversary is restricted to corrupt only a constant fraction of parties, we give a positive result by means of a tailored construction, which demonstrates that our impossibility does not extend to weaker corruption models in general.The paper on which this talk is based is available online at https://eprint.iacr.org/2023/1381

[Slides]

Presented at

MPTS 2023: NIST Workshop (virtual) on Multi-Party Threshold Schemes 2023

Event Details

Location

    Virtual

Related Topics

Security and Privacy: cryptography

Created September 21, 2023, Updated September 27, 2023