This action might not be possible to undo. Are you sure you want to continue?

BooksAudiobooksComicsSheet Music### Categories

### Categories

Scribd Selects Books

Hand-picked favorites from

our editors

our editors

Scribd Selects Audiobooks

Hand-picked favorites from

our editors

our editors

Scribd Selects Comics

Hand-picked favorites from

our editors

our editors

Scribd Selects Sheet Music

Hand-picked favorites from

our editors

our editors

Top Books

What's trending, bestsellers,

award-winners & more

award-winners & more

Top Audiobooks

What's trending, bestsellers,

award-winners & more

award-winners & more

Top Comics

What's trending, bestsellers,

award-winners & more

award-winners & more

Top Sheet Music

What's trending, bestsellers,

award-winners & more

award-winners & more

P. 1

Lecture 18- Zero-knowledge Proofs|Views: 0|Likes: 0

Published by alpac

zero

zero

See more

See less

https://www.scribd.com/doc/219707865/Lecture-18-Zero-knowledge-Proofs

04/22/2014

text

original

November 7, 2006

**Lecture 18: Zero-knowledge proofs
**

Instructor: Rafael Pass Scribe: Ari Rabkin

Proving Identity

Suppose you wanted to prove your identity to a serve. You certainly don’t want to just send a password across the wire, because any adversary who intercepts the message can impersonate you. It would be much better if we could prove identity in such a way that a passive adversary cannot subsequently impersonate us. One way to solve the problem is to use a signature. Consider the following protocol. User → Server Login Server → User “Server name”, r User → Server Pk , Sk {“Server name”, r} Here, “User” is trying to prove to “Server” that she holds the private key Sk corresponding to public key Pk ; r is a nonce chosen at random from {0, 1}n . We are implicitly assuming that the signature scheme resists chosen-plaintext attacks. Constraining the text to be signed in some way (requiring it to start with “server”) helps. This protocol has a subtle consequence. The server can prove that the user with public key Pk logged in, since the server has, and can keep, the signed message Sk {“Server name”, r}. This property is sometimes undesirable. Imagine that the user is accessing a politically subversive website. With physical keys, there’s no way to show afterwards whether the key was used, and it might be nice to have a digital version of that property.

**Zero-knowledge in general
**

This seems almost paradoxical, to prove something in such a way that the thing proved can’t be established subsequently. However, zero-knoweldge proofs are a way of achieving exactly this. The key insight is for the server to ask the client to solve a puzzle the server knows the answer to. Thus, the server cannot convince a skeptical third party of anything afterwards, since the server could have created a transcript of the whole conversation. Until now in the course we’ve worried about an honest Alice who wants to talk to an honest Bob, in the presence of a malicious Eve. Here, we’re worried about an Alice and Bob who don’t trust each other. Zero-knowledge proofs are a way for Alice (the prover) to convince Bob (the veriﬁer) that

18-1

selected at random. Then you can have the veriﬁer give the prover one of the two. You might want to be able to prove that Waldo is in the image. this will always be the case. to drive the probability of error as low as desired. 1} Prover → Veriﬁer if b = 1. If the two really are distinct. Here’s a slightly less toy example. cut a Waldo-sized hole. How can this be possible? Let’s think about the following toy example. but the following argument will give some intuition. Zero-knowledge for graph isomorphism Let’s see a more mathematical version of a zero-knowledge proof. If G1 and G2 are not isomorphic. Take a large sheet of newsprint. Sometimes. If the two graphs are isomorphic. then with probability 1 it will be the case that H and Gi are not isomorphic. If the graphs are not isomorphic. There is indeed a zero-knowledge proof for Waldo-presence. Prover → Veriﬁer H Veriﬁer → Prover b ∈ {0. This shows he’s somewhere in the image. the prover has access to the permutation σ such that σ (G1 ) = G2 . in his sweater and hat. but there’s no context to show where. it might be useful in a cryptographic protocol for Alice to show Bob that a number N is the product of exactly two primes. For instance. or “this is #2”. so that Waldo shows through the hole. This protocol can be 2 repeated many times (provided a fresh H is generated). π else σπ The veriﬁer then applies the given permutation to h and checks if the result is identical to Gi . and that the prover wants to convince the veriﬁer that they are isomorphic. we’ll prove this next time. Suppose you want to prove that two pictures or other objects are distinct. without revealing anything about the distinction. and overlap it on the “Where’s waldo” image. Thus. 18-2 . If they were identical. but in such a way that Bob learns nothing else.a string x is in language L. then the prover can reliably say “this one is object ”. this is a zero-knowledge protocol for graph isomorphism. then H can be isomorphic to at most one of them. since b is selected at random after H is ﬁxed. but without revealing anything about the two factors. then this protocol will succeed with probability at most one half. without showing where. and somewhere in it there’s a small picture of Waldo. in particular. Do any of you remember those “Where’s Waldo?” children’s books? Each page is a large complicated illustration. The prover generates a new graph H by permuting the vertexes of G1 according to the random permutation π −1 (so π (H ) = G1 . because π (H ) = G1 and σ (π (H )) = σ (G1 ) = G2 . Suppose there are two graphs G1 and G2 . you wonder if he’s there at all. this would be impossible. and the reader is invited to ﬁnd him.

1}∗ so that P r[Outv [P (x. V is PPT in |x|. First. Trivially. If we are only interested in small x. it is produced by the interaction between two machines. We also can relax the deﬁnition and replace the 1 1 − (|x|) with some constant like 2 and repeat the interactive proof many times. Soundness: There exists a negligible P ∗ and ∀y {0. because we allow a small soundness error: the error has some low probability over the space of interactions. Soundness: x ∈ L ⇒ ∀πV (x. Completeness: ∀x ∈ L∃y ∈ {0. and second. 1}∗ it holds that so that ∀x ∈ L and for all turing machines P r[Outv [P ∗ (x. but let’s ﬁrst remind ourself how non-interactive proof is deﬁned. Deﬁnition 2 (Interactive proof ) P. it represents the two machines exchanging bit strings. since if a non-interactive proof exists. N P ⊂ IP . y ) ↔ V (x)] = 0] > 1 − (|x|) 3. y ) ↔ V (x)] = 1] = 1 2. The deﬁnition is a bit tricky since it needs to exclude inﬁnite rounds of message exchange and so that P ∗ always halts. Completeness: x ∈ L ⇒ there exists a proof pi so that V (x. π ) = 0 3. It’s not too hard to show that this represents exactly the complexity class NP as deﬁned in terms of nondeterministic turing machines. P can just give V the NP proof string. Deﬁnition 1 (NP-veriﬁer) V is an NP-veriﬁer for a language L if: 1. V is polynomial time in |x|. We don’t stop to formalize ↔. we can arrange to deﬁne x with some sort of padding to drive the probability of error own. The set of languages for which interactive proofs exist is the complexity class IP . π ) = 1 2. 18-3 . An Interactive proof diﬀers in two key respects.Interactive proof We will now formally deﬁne zero-knowledge interactive proof. V is an interactive proof for a language L if: 1.

i ∈ {0. this will only be true half the time. 1} Prover → Veriﬁer b where H is isomorphic to Gb The veriﬁer checks if b = b . but add the zero-knowledge criterion. it is believed that IP ⊂ N P . we’re going to focus on the case where the prover is constrained to be polynomial time. this establishes that there are zero-knowledge proofs for every language in N P . 18-4 . We’re ultimately going to show how to do zero-knoweldge for graph 3-coloring (similar to isomorphism). Suppose we have two non-isomorphic graphs G1 and G2 Veriﬁer → Prover H isomorphic to Gi .However. If the graphs really are isomorphic. accepts. and if so. We’re not going to prove it. since the prover can do arbitrary computation. since there is an interactive proof for graph non-isomorphism. The interactive proof is just the one mentioned above for distinguishing objects. but it turns out that IP is equal to P SP ACE . which is a problem in co-NP. Since 3-coloring is N P -complete. Conclusion This shows that IP includes things that are believed to not be in N P . Note that the prover is able to determine which of the graphs H is isomorphic to. Next time.

Macbook

Dell Poweredge720 Setup

Advanced Information Assurance Handbook

∆ιαφορικές εξισώσεις και εξισώσεις διαφορών για μη μαθηματικούς

051_ΙΣΤΟΡΙΚΗ ΕΙΣΑΓΩΓΗ ΣΤΗΝ ΕΠΙΣΤΗΜΗ ΤΟΥ ΧΑΟΥΣ

Pomodoro Inventory

Computer Science Sample Sop 5

salesforce_content_implementation_guide

- Read and print without ads
- Download to keep your version
- Edit, email or read offline

Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

CANCEL

OK

You've been reading!

NO, THANKS

OK

scribd