Abstract
In this paper we provide a new cryptographic primitive that generalizes several existing zero-knowledge proofs and show that if a languageL induces the primitive, then there exists a perfect zero-knowledge proof forL. In addition, we present several kinds of languages inducing the primitive, some of which are not known to have a perfect zero-knowledge proof.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Aiello, W., and Håstad, J., Statistical Zero-Knowledge Languages Can Be Recognized in Two Rounds,J. Comput. System Sci., Vol. 42, No. 3, pp. 327–345 (1991).
Bellare, M., Micali, S., and Ostrovsky, R., Perfect Zero-Knowledge in Constant Rounds,Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pp. 482–493 (1990).
Bellare, M., Micali, S., and Ostrovsky, R., The (True) Complexity of Statistical Zero-Knowledge,Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pp. 494–502 (1990).
Ben-Or, M., Goldreich, O., Goldwasser, S., Håstad, J., Kilian, J., Micali, S., and Rogaway, P., Everything Provable Is Provable in Zero-Knowledge.Proceedings of Crypto '88, Lecture Notes in Computer Science, Vol. 403, pp. 37–56 (1990).
Blum, M., How To Prove a Theorem so No One Else Can Claim It,Proceedings of the ICM, pp. 1444–1451 (1986).
Boppana, R., Håstad, J., and Zachos, S., Does co-NP Have Short Interactive Proofs?,Inform. Process. Lett., Vol. 25, No. 2, pp. 127–132 (1987).
Boyar, J., Friedl, K., and Lund, C., Practical Zero-Knowledge Proof: Giving Hints and Using Deficiencies,J. Cryptology, Vol. 4, No. 3, pp. 185–206 (1991).
Brassard, G., Chaum, D., and Crépeau, C., Minimum Disclosure Proofs of Knowledge.J. Comput. System Sci., Vol. 37, No. 2, pp. 156–189 (1988).
Chang, R., On the Structure of Bounded Queries to ArbitraryNP Sets,Proceedings of the 4th Structure in Complexity Theory Conference, pp. 250–258 (1989).
Feige, U., and Shamir, A., Zero-Knowledge Proofs of Knowledge in Two Rounds.Proceedings of Crypto '89. Lecture Notes in Computer Science, Vol. 435, pp. 526–544 (1990).
Fortnow, L., The Complexity of Perfect Zero-Knowledge,Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 204–209 (1987).
Goldreich, O., and Krawczyk, H., On the Composition of Zero-Knowledge Proof Systems.Proceedings of ICALP '90, Lecture Notes in Computer Science, Vol. 443, pp. 268–282 (1990).
Goldreich, O., Micali, S., and Wigderson, A., Proofs that Yield Nothing but Their Validity or All Languages inNP have Zero-Knowledge Proof Systems.J. Assoc. Comput. Mach., Vol. 38, No. 1, pp. 691–729 (1991).
Goldreich, O., and Oren, Y., Definitions and Properties of Zero-Knowledge Proof Systems.J. Cryptology, Vol. 7, No. 1, pp. 1–32 (1994).
Goldreich, O., Ostrovsky, R., and Petrank, E., Computational Complexity and Knowledge Complexity,Proceedings of the 26th Annual ACM Symposium on the Theory of Computing, pp. 534–543 (1994).
Goldwasser, S., Micali, S., and Rackoff, C., The Knowledge Complexity of Interactive Proof Systems,SIAM J. Comput., Vol. 18, No. 1, pp. 186–208 (1989).
Köbler, J., Schöning, U., and Torán, J.,The Graph Isomorphism Problem: Its Structural Complexity, Birkhäuser, Boston (1993).
Lozano, A., and Torán, L., On the Nonuniform Complexity of the Graph Isomorphism Problem,Proceedings of the 7th Structure in Complexity Theory Conference, pp. 118–131 (1992).
Naor, M., Ostrovksy, R., Venkatesan, R., and Yung, M., Perfect Zero-Knowledge Arguments forNP Can Be Based on General Complexity Assumptions.Proceedings of Crypto, '92, Lecture Notes in Computer Science, Vol. 740, pp. 196–214 (1993).
Ostrovsky, R., Venkatesan, R., and Yung, M., Secure Commitment Against a Powerful Adversary.Proceedings of STACS '92, Lecture Notes in Computer Science, Vol. 577, pp. 439–448 (1992).
Tompa, M., and Woll, H., Random Self-Reducibility and Zero-Knowledge Interactive Proofs of Possession of Information,Proceedings of the 28th Annual IEEE Symposium on Foundations of Computer Science, pp. 472–482 (1987).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Joan Feigenbaum
Rights and permissions
About this article
Cite this article
Itoh, T., Ohta, Y. & Shizuya, H. A language-dependent cryptographic primitive. J. Cryptology 10, 37–49 (1997). https://doi.org/10.1007/s001459900018
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/s001459900018