Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya
{"title":"关于循环群中指数知识假设的分类","authors":"Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya","doi":"10.4036/iis.2019.r.03","DOIUrl":null,"url":null,"abstract":"Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.","PeriodicalId":91087,"journal":{"name":"Interdisciplinary information sciences","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Classification of Knowledge-of-exponent Assumptions in Cyclic Groups\",\"authors\":\"Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya\",\"doi\":\"10.4036/iis.2019.r.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.\",\"PeriodicalId\":91087,\"journal\":{\"name\":\"Interdisciplinary information sciences\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Interdisciplinary information sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4036/iis.2019.r.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interdisciplinary information sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4036/iis.2019.r.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Classification of Knowledge-of-exponent Assumptions in Cyclic Groups
Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.