Professional Documents
Culture Documents
0811012045
0811012045
0811012045
SEMINAR ON:
BACKGROUND INTRODUCTION EXPLANATION REDUCING PROBABILITY OF CHEATING PROPERTIES OF ZKP ZERO KNOWLEDGE PROOFS & NP GRAPH ISOMORPHISM GRAPH 3-COLORING APPLICATIONS CONCLUSION
2
BACKGROUND:February 9, 2012
The Fact:
Identifications and passwords are essential parts in a secured system in which they prevent unauthorized access to private materials.
The Problem:
Passwords are assigned to authorized personnel and are meant to be kept secret. But ironically, one often have to give out his/her password during authentication. Thats not very safe!
The Solution:
Zero-Knowledge Protocol!
3
INTRODUCTION:February 9, 2012
Zero-knowledge proof protocol allows one party, usually called PROVER, to convince another party, called VERIFIER, that PROVER knows some facts (a secret, a proof of a theorem,...) without revealing to the VERIFIER ANY information about his knowledge (secret, proof,...). Zero Knowledge proof is a special type of Interactive Proof System.
4
EXPLANATION:
February 9, 2012
Analogy of Ali babas Cave, also called as GuillouQuisquaters Protocol is used. Three characters mentioned for explanation viz: (a) PROVER (Peggy): He has to prove his secret without letting anyone know what it is.
(b) VERIFIER (Victor): He has to verify whether Peggy knows the secret or not through series of experiments on him. (c) MALICE (Mike): Simply put, the bad guy who tries to cheat the security system.
EXPLANATION (CONT.)
February 9, 2012
Victor stands at point P Peggy chooses any path randomly & walks into the cave to point R or S. Now Victor walks to Q. Victor asks peggy to come out of the cave either from left. or from right. Peggy, using the magic words, comes out.
Probability of cheating: 2-k With increase in number of iterations, the probability of cheating the verifier by the prover decreases
7
PROPERTIES OF ZKP:
February 9, 2012
Completeness:
The Verifier will always accept a proof from the Prover, given that they both follows the correct protocol.
Soundness:
The Verifier will not accept any incorrect proof from the Prover, given that the Verifier follows the correct protocol.
Zero knowledge proofs
Zero-Knowledge:
During the whole proving process, the Verifier will learn nothing about the Provers secret, nor will she be able to prove that secret to any other party.
8
NP- Problems having no efficient algorithm. ZK used for demonstrating Proofs that yeild nothing but their validity
1. GRAPH ISOMORPHISM:
February 9, 2012
Peggy has two isomorphic graphs : G1 = (V1, E1), & G2 = (V2, E2), related by isomorphism . Peggy wants to prove to Victor that G1 and G2 are isomorphic without giving away the isomorphism.
10
Peggy produces H that is isomorphic to G1 & G2. Peggy sends H to Victor. Victor asks Peggy either to: (a) prove that H & G1 are isomorphic, or, (b) prove that H & G2 are isomorphic.
11
Common Input: A Graph G(V,E). Prover can paint the vertices of the Graph in 3 colors. Prover must keep the coloring, a SECRET. But has to verify by the Verifier.
12
Prover chooses a random color permutation He puts all the nodes inside envelopes. And sends them to the verifier.
13
Prover opens the envelopes revealing the colors. Verifier accepts if the colors are different.
14
February 9, 2012
APPLICATIONS:Zero Knowledge Proofs can be applied where secret knowledge too sensitive to reveal, needs to be verified: Key Authentication PIN numbers Smart cards Embedded systems
15
Advantages of Zero-Knowledge Protocols: Secured Not requiring the revelation of ones secret. Simple Does not involve complex encryption methods. Disadvantages of Zero-Knowledge Protocols:
Limited Secret must be numerical, otherwise a translation is needed. Lengthy There are 2k computations, each computation requires a certain amount of running time. Imperfect The Malice can still intercept the transmission (i.e. messages to the Verifier or the Prover might be modified or destroyed).
16
CONCLUSION:February 9, 2012
Special case of interactive proofs. Zero knowledge proofs offer a way to prove knowledge to someone without transferring any additional knowledge to that person. It Can be used to prove identity.
17
REFERENCES:
February 9, 2012
http://www.cs.princeton.edu/courses/archive/fall07/cos 433/lec15.pdf
http://www.wisdom.weizmann.ac.il/~oded/zktut02.html
18
http://www.wisdom.weizmann.ac.il/~oded/gmw1.html
19
February 9, 2012