Zero-Knowledge MIPs using Homomorphic Commitment Schemes

04/19/2023
by   Claude Crépeau, et al.
0

A Zero-Knowledge Protocol (ZKP) allows one party to convince another party of a fact without disclosing any extra knowledge except the validity of the fact. For example, it could be used to allow a customer to prove their identity to a potentially malicious bank machine without giving away private information such as a personal identification number. This way, any knowledge gained by a malicious bank machine during an interaction cannot be used later to compromise the client's banking account. An important tool in many ZKPs is bit commitment, which is essentially a digital way for a sender to put a message in a lock-box, lock it, and send it to the receiver. Later, the key is sent for the receiver to open the lock box and read the message. This way, the message is hidden from the receiver until they receive the key, and the sender is unable to change their mind after sending the lock box. In this paper, the homomorphic properties of a particular multi-party commitment scheme are exploited to allow the receiver to perform operations on commitments, resulting in polynomial time ZKPs for two NP-Complete problems: the Subset Sum Problem and 3SAT. These ZKPs are secure with no computational restrictions on the provers, even with shared quantum entanglement. In terms of efficiency, the Subset Sum ZKP is competitive with other practical quantum-secure ZKPs in the literature, with less rounds required, and fewer computations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2020

On The Round Complexity of Two-Party Quantum Computation

We investigate the round complexity of maliciously-secure two-party quan...
research
09/29/2021

Certified Everlasting Zero-Knowledge Proof for QMA

In known constructions of classical zero-knowledge protocols for NP, eit...
research
04/10/2021

Non-Destructive Zero-Knowledge Proofs on Quantum States, and Multi-Party Generation of Authorized Hidden GHZ States

Due to the special no-cloning principle, quantum states appear to be ver...
research
04/20/2023

Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)

Can a sender non-interactively transmit one of two strings to a receiver...
research
02/28/2023

Uncloneable Cryptographic Primitives with Interaction

Much of the strength of quantum cryptography may be attributed to the no...
research
11/19/2019

Entanglement-based quantum private comparison protocol with bit-flipping

Quantum private comparison (QPC), whose security is based on the laws of...
research
06/20/2023

A Survey of Multivariate Polynomial Commitment Schemes

A commitment scheme is a cryptographic tool that allows one to commit to...

Please sign up or login with your details

Forgot password? Click here to reset