Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/172708
Title: | Non-interactive zero-knowledge functional proofs | Authors: | Zeng, Gongxian Lai, Junzuo Huang, Zhengan Zhang, Linru Wang, Xiangning Lam, Kwok-Yan Wang, Huaxiong Weng, Jian |
Keywords: | Engineering::Computer science and engineering::Data::Data encryption | Issue Date: | 2023 | Source: | Zeng, G., Lai, J., Huang, Z., Zhang, L., Wang, X., Lam, K., Wang, H. & Weng, J. (2023). Non-interactive zero-knowledge functional proofs. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2023), LNCS 14442, 236-268. https://dx.doi.org/10.1007/978-981-99-8733-7_8 | Conference: | International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2023) | Abstract: | In this paper, we consider to generalize NIZK by empowering a prover to share a witness in a fine-grained manner with verifiers. Roughly, the prover is able to authorize a verifier to obtain extra information of witness, i.e., besides verifying the truth of the statement, the verifier can additionally obtain certain function of the witness from the accepting proof using a secret functional key provided by the prover. To fulfill these requirements, we introduce a new primitive called non-interactive zero-knowledge functional proofs (fNIZKs), and formalize its security notions. We provide a generic construction of fNIZK for any relation , which enables the prover to share any function of the witness with a verifier. For a widely-used relation about set membership proof (implying range proof), we construct a concrete and efficient fNIZK, through new building blocks (set membership encryption and dual inner-product encryption), which might be of independent interest. | URI: | https://hdl.handle.net/10356/172708 | ISBN: | 978-981-99-8732-0 | DOI: | 10.1007/978-981-99-8733-7_8 | Research Centres: | Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) | Rights: | © 2023 International Association for Cryptologic Research. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1007/978-981-99-8733-7_8. | Fulltext Permission: | embargo_20241225 | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
asiacrypt2023-final265.pdf Until 2024-12-25 | 1.37 MB | Adobe PDF | Under embargo until Dec 25, 2024 |
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.