Skip to main content

Towards Non-interactive Witness Hiding

Author(s): Kuykendall, Benjamin; Zhandry, Mark

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1kn9h
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKuykendall, Benjamin-
dc.contributor.authorZhandry, Mark-
dc.date.accessioned2021-10-08T19:51:26Z-
dc.date.available2021-10-08T19:51:26Z-
dc.date.issued2020en_US
dc.identifier.citationKuykendall, Benjamin, and Mark Zhandry. "Towards Non-interactive Witness Hiding." In Theory of Cryptography Conference (2020): pp. 627-656. doi:10.1007/978-3-030-64375-1_22en_US
dc.identifier.issn0302-9743-
dc.identifier.urihttps://www.cs.princeton.edu/~mzhandry/docs/papers/NIWH.pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1kn9h-
dc.description.abstractWitness hiding proofs require that the verifier cannot find a witness after seeing a proof. The exact round complexity needed for witness hiding proofs has so far remained an open question. In this work, we provide compelling evidence that witness hiding proofs are achievable non-interactively for wide classes of languages. We use non-interactive witness indistinguishable proofs as the basis for all of our protocols. We give four schemes in different settings under different assumptions: A universal non-interactive proof that is witness hiding as long as any proof system, possibly an inefficient and/or non-uniform scheme, is witness hiding, has a known bound on verifier runtime, and has short proofs of soundness. A non-uniform non-interactive protocol justified under a worst-case complexity assumption that is witness hiding and efficient, but may not have short proofs of soundness. A new security analysis of the two-message argument of Pass [Crypto 2003], showing witness hiding for any non-uniformly hard distribution. We propose a heuristic approach to removing the first message, yielding a non-interactive argument. A witness hiding non-interactive proof system for languages with unique witnesses, assuming the non-existence of a weak form of witness encryption for any language in π–­π–―βˆ©π–Όπ—ˆπ–­π–― .en_US
dc.format.extent627 - 656en_US
dc.language.isoen_USen_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.rightsAuthor's manuscripten_US
dc.titleTowards Non-interactive Witness Hidingen_US
dc.typeConference Articleen_US
dc.identifier.doi10.1007/978-3-030-64375-1_22-
dc.identifier.eissn1611-3349-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
WitHiding.pdf415.9 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.