关于循环群中指数知识假设的分类

Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya
{"title":"关于循环群中指数知识假设的分类","authors":"Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya","doi":"10.4036/iis.2019.r.03","DOIUrl":null,"url":null,"abstract":"Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.","PeriodicalId":91087,"journal":{"name":"Interdisciplinary information sciences","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Classification of Knowledge-of-exponent Assumptions in Cyclic Groups\",\"authors\":\"Firas Kraiem, Shuji Isobe, E. Koizumi, Hiroki Shizuya\",\"doi\":\"10.4036/iis.2019.r.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.\",\"PeriodicalId\":91087,\"journal\":{\"name\":\"Interdisciplinary information sciences\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Interdisciplinary information sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4036/iis.2019.r.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interdisciplinary information sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4036/iis.2019.r.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

受gaddafi和growth (ASIACRYPT 2017)关于循环群中某种类型的计算硬度假设(他们称之为“目标假设”)的工作的启发,我们对另一种类型的硬度假设,即“指数知识”假设(KEAs)进行了类似的工作。最初由Damga˚rd引入,用于构建实用的加密方案,以防止选定的密文攻击,KEAs随后主要用于构建简洁的非交互式知识参数(SNARKs),并被证明是这种结构所固有的。由于SNARKs(以及它们的零知识变体,zk-SNARKs)已经在诸如Zcash数字货币的系统中实际使用,可以预期KEAs的使用将在未来增加,这使得很好地理解这些假设变得很重要。使用Bellare和Palacio首先引入的证明技术(但被他们承认是由于Halevi),我们首先研究了growth引入的q -power知识指数(q -PKE)假设家族的内部结构,这是迄今为止最普遍的KEAs变体。然后我们引入了q -PKE族的推广,并证明了它可以简化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the Classification of Knowledge-of-exponent Assumptions in Cyclic Groups
Inspired by the work of Ghadafi and Groth (ASIACRYPT 2017) on a certain type of computational hardness assumptions in cyclic groups (which they call ‘‘target assumptions’’), we initiate an analogous work on another type of hardness assumptions, namely the ‘‘knowledge-of-exponent’’ assumptions (KEAs). Originally introduced by Damga˚rd to construct practical encryption schemes secure against chosen ciphertext attacks, KEAs have subsequently been used primarily to construct succinct non-interactive arguments of knowledge (SNARKs), and proved to be inherent to such constructions. Since SNARKs (and their zero-knowledge variant, zk-SNARKs) are already used in practice in such systems as the Zcash digital currency, it can be expected that the use of KEAs will increase in the future, which makes it important to have a good understanding of those assumptions. Using a proof technique first introduced by Bellare and Palacio (but acknowledged by them as being due to Halevi), we first investigate the internal structure of the q -power knowledge-of-exponent ( q -PKE) family of assumptions introduced by Groth, which is thus far the most general variant of KEAs. We then introduce a generalisation of the q -PKE family, and show that it can be simplified.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信