Matches in SemOpenAlex for { <https://semopenalex.org/work/W2952381036> ?p ?o ?g. }
- W2952381036 startingPage "314" @default.
- W2952381036 abstract "We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. As negative results in the area of concurrent non-malleable zero-knowledge imply that protocols in the standard setting (i.e., under no setup assumptions) can only be given for trivial languages, researchers have studied such protocols in models with setup assumptions, such as the common reference string (CRS) model. This model assumes that a reference string is honestly created at the beginning of all interactions and later available to all parties (an assumption that is satisfied, for instance, in the presence of a trusted party). A growing area of research in Cryptography is that of reducing the setup assumptions under which certain cryptographic protocols can be realized. In an effort to reduce the setup assumptions required for efficient zeroknowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks, we consider a model, which we call the Authenticated Public-Key (APK) model. The APK model seems to significantly reduce the setup assumptions made by the CRS model (as no trusted party or honest execution of a centralized algorithm are required), and can be seen as a slightly stronger variation of the Bare Public-Key (BPK) model from [8, 30], and a weaker variation of the registered public-key model used in [3]. We then define and study man-in-the-middle attacks in the APK model. Our main result is a constant-round concurrent non-malleable zero-knowledge argument of knowledge for any polynomial-time relation (associated to a language in NP), under the (minimal) assumption of the existence of a one-way function family. We also show time-efficient instantiations of our protocol, in which the transformation from a 3-round honest-verifier zero-knowledge argument of knowledge to a 4-round concurrently non-malleable zero-knowledge argument of knowledge for the same relation incurs only O(1) (precisely, a small constant) additional modular exponentiations, based on known number-theoretic assumptions. Furthermore, the APK model is motivated by the consideration of some man-inthe-middle attacks in models with setup assumptions that had not been considered previously and might be of independent interest. We also note a negative result with respect to further reducing the setup assumptions of our protocol to those in the (unauthenticated) BPK model, by showing that concurrently non-malleable zero-knowledge arguments of knowledge in the BPK model are only possible for trivial languages." @default.
- W2952381036 created "2019-06-27" @default.
- W2952381036 creator A5008820992 @default.
- W2952381036 creator A5011460496 @default.
- W2952381036 creator A5078354018 @default.
- W2952381036 date "2006-01-01" @default.
- W2952381036 modified "2023-09-23" @default.
- W2952381036 title "Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model" @default.
- W2952381036 cites W1504794065 @default.
- W2952381036 cites W1519095911 @default.
- W2952381036 cites W1527891585 @default.
- W2952381036 cites W1532874975 @default.
- W2952381036 cites W158026054 @default.
- W2952381036 cites W1882430379 @default.
- W2952381036 cites W1885156594 @default.
- W2952381036 cites W1970606468 @default.
- W2952381036 cites W1974751157 @default.
- W2952381036 cites W1987890787 @default.
- W2952381036 cites W198979078 @default.
- W2952381036 cites W2010507480 @default.
- W2952381036 cites W2012045293 @default.
- W2952381036 cites W2015880590 @default.
- W2952381036 cites W2059808351 @default.
- W2952381036 cites W2064545345 @default.
- W2952381036 cites W2065722310 @default.
- W2952381036 cites W2074594718 @default.
- W2952381036 cites W2077140897 @default.
- W2952381036 cites W2090903439 @default.
- W2952381036 cites W2095708839 @default.
- W2952381036 cites W2097475480 @default.
- W2952381036 cites W2098121410 @default.
- W2952381036 cites W2102632861 @default.
- W2952381036 cites W2111749650 @default.
- W2952381036 cites W2116432146 @default.
- W2952381036 cites W2117797270 @default.
- W2952381036 cites W2126661026 @default.
- W2952381036 cites W2129086113 @default.
- W2952381036 cites W2144820675 @default.
- W2952381036 cites W2151413173 @default.
- W2952381036 cites W2153825963 @default.
- W2952381036 cites W2159339434 @default.
- W2952381036 cites W2400376265 @default.
- W2952381036 cites W2406997696 @default.
- W2952381036 cites W2612720194 @default.
- W2952381036 hasPublicationYear "2006" @default.
- W2952381036 type Work @default.
- W2952381036 sameAs 2952381036 @default.
- W2952381036 citedByCount "4" @default.
- W2952381036 crossrefType "posted-content" @default.
- W2952381036 hasAuthorship W2952381036A5008820992 @default.
- W2952381036 hasAuthorship W2952381036A5011460496 @default.
- W2952381036 hasAuthorship W2952381036A5078354018 @default.
- W2952381036 hasConcept C110875604 @default.
- W2952381036 hasConcept C136764020 @default.
- W2952381036 hasConcept C138885662 @default.
- W2952381036 hasConcept C148730421 @default.
- W2952381036 hasConcept C157486923 @default.
- W2952381036 hasConcept C176329583 @default.
- W2952381036 hasConcept C178489894 @default.
- W2952381036 hasConcept C203062551 @default.
- W2952381036 hasConcept C26517878 @default.
- W2952381036 hasConcept C2780813799 @default.
- W2952381036 hasConcept C33923547 @default.
- W2952381036 hasConcept C37914503 @default.
- W2952381036 hasConcept C38652104 @default.
- W2952381036 hasConcept C41008148 @default.
- W2952381036 hasConcept C41895202 @default.
- W2952381036 hasConcept C80444323 @default.
- W2952381036 hasConceptScore W2952381036C110875604 @default.
- W2952381036 hasConceptScore W2952381036C136764020 @default.
- W2952381036 hasConceptScore W2952381036C138885662 @default.
- W2952381036 hasConceptScore W2952381036C148730421 @default.
- W2952381036 hasConceptScore W2952381036C157486923 @default.
- W2952381036 hasConceptScore W2952381036C176329583 @default.
- W2952381036 hasConceptScore W2952381036C178489894 @default.
- W2952381036 hasConceptScore W2952381036C203062551 @default.
- W2952381036 hasConceptScore W2952381036C26517878 @default.
- W2952381036 hasConceptScore W2952381036C2780813799 @default.
- W2952381036 hasConceptScore W2952381036C33923547 @default.
- W2952381036 hasConceptScore W2952381036C37914503 @default.
- W2952381036 hasConceptScore W2952381036C38652104 @default.
- W2952381036 hasConceptScore W2952381036C41008148 @default.
- W2952381036 hasConceptScore W2952381036C41895202 @default.
- W2952381036 hasConceptScore W2952381036C80444323 @default.
- W2952381036 hasLocation W29523810361 @default.
- W2952381036 hasOpenAccess W2952381036 @default.
- W2952381036 hasPrimaryLocation W29523810361 @default.
- W2952381036 hasRelatedWork W1504794065 @default.
- W2952381036 hasRelatedWork W1558226165 @default.
- W2952381036 hasRelatedWork W1576798452 @default.
- W2952381036 hasRelatedWork W158026054 @default.
- W2952381036 hasRelatedWork W1760491510 @default.
- W2952381036 hasRelatedWork W198979078 @default.
- W2952381036 hasRelatedWork W2088492763 @default.
- W2952381036 hasRelatedWork W2097475480 @default.
- W2952381036 hasRelatedWork W2103286324 @default.
- W2952381036 hasRelatedWork W2129086113 @default.
- W2952381036 hasRelatedWork W2228095970 @default.
- W2952381036 hasRelatedWork W2536903418 @default.