International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Round Optimal Black-Box “Commit-and-Prove”

Authors:
Dakshita Khurana
Rafail Ostrovsky
Akshayaram Srinivasan
Download:
DOI: 10.1007/978-3-030-03807-6_11
Search ePrint
Search Google
Conference: TCC 2018
Abstract: Motivated by theoretical and practical considerations, an important line of research is to design secure computation protocols that only make black-box use of cryptography. An important component in nearly all the black-box secure computation constructions is a black-box commit-and-prove protocol. A commit-and-prove protocol allows a prover to commit to a value and prove a statement about this value while guaranteeing that the committed value remains hidden. A black-box commit-and-prove protocol implements this functionality while only making black-box use of cryptography.In this paper, we build several tools that enable constructions of round-optimal, black-box commit and prove protocols. In particular, assuming injective one-way functions, we design the first round-optimal, black-box commit-and-prove arguments of knowledge satisfying strong privacy against malicious verifiers, namely:Zero-knowledge in four rounds and,Witness indistinguishability in three rounds. Prior to our work, the best known black-box protocols achieving commit-and-prove required more rounds.We additionally ensure that our protocols can be used, if needed, in the delayed-input setting, where the statement to be proven is decided only towards the end of the interaction. We also observe simple applications of our protocols towards achieving black-box four-round constructions of extractable and equivocal commitments.We believe that our protocols will provide a useful tool enabling several new constructions and easy round-efficient conversions from non-black-box to black-box protocols in the future.
BibTeX
@inproceedings{tcc-2018-28988,
  title={Round Optimal Black-Box “Commit-and-Prove”},
  booktitle={Theory of Cryptography},
  series={Theory of Cryptography},
  publisher={Springer},
  volume={11239},
  pages={286-313},
  doi={10.1007/978-3-030-03807-6_11},
  author={Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan},
  year=2018
}