Abstract
We revisit the Cramer, Damgård, Schoenmakers (CDS) approach for composing sigma protocols, and adapt it to a setting in which the underlying protocols have multiple rounds of interaction. The goal of CDS composition is to prove compound NP-relations by combining multiple “atomic” proof systems. Its key feature is that it interacts with the atomic proofs in a generic fashion, enabling simpler and more efficient implementation.
Recent developments in multi-round protocols call for the adaptation of CDS composition beyond its original scope, which not only was restricted to three-move protocols but in fact fails in the multi-round case, as well as in the composition of so-called k-special sound proofs.
We propose a new method for multi-round composition in the plain model, in a soundness preserving way and with an “offline” zero-knowledge simulation property. The need for handling arbitrary monotone access structures in \(\textsf{mNC}^1\), which is all Boolean function families represented by polynomial-size formulas over some fixed complete basis, leads us to identify a complexity theoretic problem of independent interest.
Prior to our work, multi-round composition was either restricted to the random oracle model, or worked only for argument systems, and moreover required heavy “online” zero-knowledge simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abe, M., Ambrona, M., Bogdanov, A., Ohkubo, M., Rosen, A.: Non-interactive composition of sigma-protocols via share-then-hash. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12493, pp. 749–773. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64840-4_25
Abe, M., Ambrona, M., Bogdanov, A., Ohkubo, M., Rosen, A.: Acyclicity programming for sigma-protocols. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 435–465. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_15
Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 415–432. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_26
Ajtai, M., Komlós, J., Szemerédi, E.: An \(o(n log n)\) sorting network. In: STOC ’83: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 1–9. ACM Press, New York (1983)
Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 2087–2104. ACM (2017)
Attema, T., Cramer, R., Fehr, S.: Compressing proofs of k-Out-Of-n partial knowledge. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 65–91. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_3
Attema, T., Cramer, R., Kohl, L.: A compressed \(\sigma \)-protocol theory for lattices. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12826, pp. 549–579. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84245-1_19
Attema, T., Fehr, S.: Parallel repetition of (\(k_1, \dots , k_{\mu }\))-special-sound multi-round interactive proofs. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part I. LNCS, vol. 13507, pp. 415–443. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_15
Attema, T., Fehr, S., Resch, N.: Generalized special-sound interactive proofs and their knowledge soundness. In: Rothblum, G., Wee, H. (eds.) TCC 2023, Part III. LNCS, vol. 14371, pp. 424–454. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-48621-0_15
Avitabile, G., Botta, V., Friolo, D., Visconti, I.: Efficient proofs of knowledge for threshold relations. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS 2022, Part III. LNCS, vol. 13556, pp. 42–62. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17143-7_3
Baum, C., Malozemoff, A.J., Rosen, M.B., Scholl, P.: \(\sf Mac^{\prime }n^{\prime }Cheese\): zero-knowledge proofs for boolean and arithmetic circuits with nested disjunctions. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 92–122. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_4
Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Fast reed-solomon interactive oracle proofs of proximity. In: 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018, July 9-13, 2018, Prague, Czech Republic. LIPIcs, vol. 107, pp. 14:1–14:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2018)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_3
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 243–265. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24174-6_13
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 315–334. IEEE Computer Society (2018)
Bünz, B., Fisch, B., Szepieniec, A.: Transparent SNARKs from DARK compilers. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 677–706. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45721-1_24
Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., Visconti, I.: Improved OR-composition of sigma-protocols. In: Kushilevitz, E., Malkin, T. (eds.) TCC 2016. LNCS, vol. 9563, pp. 112–141. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49099-0_5
Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., Visconti, I.: Online/offline OR composition of sigma protocols. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 63–92. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_3
Cramer, R.: Modular Design of Secure yet Practical Cryptographic Protocols. Ph.D. thesis, University of Amsterdam (1997)
Cramer, R., Damgård, I., MacKenzie, P.: Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354–372. Springer, Heidelberg (2000). https://doi.org/10.1007/978-3-540-46588-1_24
Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316–334. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45539-6_22
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_19
Don, J., Fehr, S., Majenz, C., Schaffner, C.: Efficient nizks and signatures from commit-and-open protocols in the QROM. In: CRYPTO 2022, Part II. LNCS, vol. 13508, pp. 729–757. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15979-4_25
Don, J., Fehr, S., Majenz, C., Schaffner, C.: Online-extractability in the quantum random-oracle model. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part III. LNCS, vol. 13277, pp. 677–706. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07082-2_24
Feng, H., Liu, J., Wu, Q., Li, Y.-N.: Traceable ring signatures with post-quantum security. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 442–468. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40186-3_19
Fischlin, M., Harasser, P., Janson, C.: Signatures from sequential-OR proofs. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12107, pp. 212–244. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_8
Fouque, P., Georgescu, A., Qian, C., Roux-Langlois, A., Wen, W.: A generic transform from multi-round interactive proof to NIZK. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC 2023, Part II. LNCS, vol. 13941, pp. 461–481. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-31371-4_16
Goel, A., Green, M., Hall-Andersen, M., Kaptchuk, G.: Stacking sigmas: a framework to compose \(\varSigma \)-protocols for disjunctions. IACR Cryptol. ePrint Arch., p. 422 (2021)
Goel, A., Green, M., Hall-Andersen, M., Kaptchuk, G.: Stacking sigmas: A framework to compose \(\Sigma \)-protocols for disjunctions. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part II. LNCS, vol. 13276, pp. 458–487. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07085-3_16
Goel, A., Hall-Andersen, M., Kaptchuk, G., Spooner, N.: Speed-stacking: fast sublinear zero-knowledge proofs for disjunctions. In: EUROCRYPT 2023, Part II. LNCS, vol. 14005, pp. 347–378. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-30617-4_12
Grigni, M., Sipser, M.: Monotone complexity. In: Proceedings of the London Mathematical Society Symposium on Boolean Function Complexity. pp. 57–75. Cambridge University Press, USA (1992)
Groth, J., Kohlweiss, M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 253–280. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_9
Heath, D., Kolesnikov, V.: Stacked garbling for disjunctive zero-knowledge proofs. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12107, pp. 569–598. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_19
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 21–30. ACM (2007)
Kattis, A.A., Panarin, K., Vlasov, A.: Redshift: transparent snarks from list polynomial commitments. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7–11, 2022, pp. 1725–1737. ACM (2022)
Katz, J., Kolesnikov, V., Wang, X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15–19 October, 2018, pp. 525–537. ACM (2018)
Kim, A., Liang, X., Pandey, O.: A new approach to efficient non-malleable zero-knowledge. In: Chung, Y., Yung, M. (eds.) CRYPTO 2022, Part IV. LNCS, vol. 13510, pp. 389–418. Springer, Cham (2022). https://doi.org/10.1007/978-3-642-17955-6_3
Lindell, Y.: An efficient transform from sigma protocols to NIZK with a CRS and non-programmable random oracle. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9014, pp. 93–109. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46494-6_5
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Valiant, L.: Short monotone formulae for the majority function. J. Algorithms 5(3), 363–366 (1984)
Wikström, D.: Special soundness revisited. Cryptology ePrint Archive, Paper 2018/1157 (2018). https://eprint.iacr.org/2018/1157
Wikström, D.: Special soundness in the random oracle model. Cryptology ePrint Archive, Paper 2021/1265 (2021). https://eprint.iacr.org/2021/1265
Zeng, G., Lai, J., Huang, Z., Wang, Y., Zheng, Z.: Dag-\(\varSigma \): A dag-based sigma protocol for relations in CNF. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT 2022, Part II. LNCS, vol. 13792, pp. 340–370. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-22966-4_12
Acknowledgements
We are grateful to Siyao Guo for useful advice and anonymous reviewers from Eurocrypt 2024 and Crypto 2024 for helpful comments. Work supported by European Research Council (ERC) under the EU’s Horizon 2020 research and innovation programme (Grant agreement No. 101019547) and Cariplo CRYPTONOMEX grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Dual-Mode Commitment Scheme from DDH
A Dual-Mode Commitment Scheme from DDH
This section presents an instantiation of a dual-mode commitment scheme associated with a \(\mathsf {\varSigma }\)-protocol for proving correct generation of a binding key. We first describe the dual-mode commitment scheme taken from [38] with a modification that the prover generates the public parameters, \((\mathbb {G}, q, g)\), and chooses a random generator h by itself while they are given as a common reference string in [38]. This results in losing the original computational binding property in the hiding mode, which we do not need in our construction. It is noted that it does not spoil the computational hiding property in the binding mode as well as the mode indistinguishability where the adversary is the verifier. We instantiate \(\textsf{dmCom}= \{\ensuremath {\textsf{CGen}_{\textsf{BIND}}}, \ensuremath {\textsf{CGen}_{\textsf{HIDE}}}, \ensuremath {\textsf{Com}}, \ensuremath {\textsf{Eqv}}\}\) as follows:
-
\(\ensuremath {\textsf{CGen}_{\textsf{BIND}}}(\ensuremath {1^\ensuremath {\lambda }})\rightarrow \ensuremath {\textsf{ck}}\): Run \((\mathbb {G}, q, g) \leftarrow \mathcal{G}(\ensuremath {1^\ensuremath {\lambda }})\). Choose
, and
. Compute \(u = g^{\rho _1}\) and \(v = g^{\rho _2}\), and output \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\).
-
\(\ensuremath {\textsf{CGen}_{\textsf{HIDE}}}(\ensuremath {1^\ensuremath {\lambda }})\rightarrow (\ensuremath {\textsf{ck}},\ensuremath {\textsf{td}})\): As above, except for choosing
, and computing \(u = g^{\rho }\), and \(v = h^{\rho }\). Output \(\ensuremath {\textsf{ck}}: = (\mathbb {G}, q, g, h, u, v)\), and \(\ensuremath {\textsf{td}}:= \rho \).
-
\(\ensuremath {\textsf{Com}}_\ensuremath {\textsf{ck}}(m;r) \rightarrow \ensuremath {\textsf{com}}\): Choose
and compute \(a = g^r / u^m\) and \(b = h^r / v^m\). Output \(\ensuremath {\textsf{com}}:= (a, b)\).
-
\(\ensuremath {\textsf{Eqv}}_\ensuremath {\textsf{td}}(\ensuremath {\textsf{com}},\ensuremath {\textsf{ck}}, m', r', m)\rightarrow r\): Take \(\rho \) from \(\ensuremath {\textsf{td}}\) and output \(r := (r' - \rho m') + \rho m\).
Theorem 10
The above \(\textsf{dmCom}\) is a dual-mode commitment scheme. It is perfectly binding in the binding mode, and equivocal in the hiding mode. It is mode indistinguishable and computationally hiding in the binding mode under the decision Diffie-Hellman assumption relative to \(\mathcal G\).
Proof
For a commitment, (a, b), let \(\tilde{a} := \log _g a\), \(\tilde{b} := \log _h b\) and \(x := \log _g h\). We first show that \(\textsf{dmCom}\) is perfectly binding in the binding mode. From \(a = g^r / u^m\) and \(b = h^r / v^m\), we have \(\tilde{a} = r + \rho _1 m\) and \(\tilde{b} = r + \rho _2 m\). Since \(\rho _1 \ne \rho _2\), they determine \(m \in \ensuremath {\mathbb {Z}}_q\) uniquely by \(m = (\tilde{a} - \tilde{b}) / (\rho _1 - \rho _2)\). To show that commitments are computationally hiding in the binding mode under the DDH assumption, consider two distributions, C(m) and R, over variables (g, h, u, v, a, b) that (g, h, u, v) is generated by \(\ensuremath {\textsf{CGen}_{\textsf{BIND}}}(\ensuremath {1^\ensuremath {\lambda }})\), and (a, b) for C(m) is generated by \(\ensuremath {\textsf{Com}}_\ensuremath {\textsf{ck}}(m)\) with \(\ensuremath {\textsf{ck}}: = (\mathbb {G}, q, g, h, u, v)\), and (a, b) for R is uniform over \(\mathbb {G}^2\). We then set up the following hybrid. For a given DDH question \(Q:=(g, g^r, h, h^{r'})\) and message m, let
and \((a,b) := ((g^r) / u^m, (h^{r'}) / v^m)\). If Q is taken from the DDH distribution where \(r=r'\), (g, h, u, v, a, b) is in C(m). On the other hand, if Q is taken from the random distribution where \(r \ne r'\), (g, h, u, v, a, b) is in R. Thus, distinguishing C(m) and R is hard under the DDH assumption. For \(m' (\ne m)\), \(C(m')\) and R are indistinguishable for the same reason. Thus, for any m and \(m'\), two distributions C(m) and \(C(m')\) are indistinguishable under the DDH assumption.
We next show that \(\textsf{dmCom}\) is perfectly hiding in the hiding mode. Since \(u = g^{\rho }\) and \(v = h^{\rho }\), we have \(\tilde{a} = \tilde{b} = r - \rho m\). Thus, for any \(m'\), there exists \(r'\) that satisfies \(\tilde{a} = \tilde{b} = r' - \rho m'\). Therefore, (r, m) is perfectly hiding.
Mode indistinguishability is directly from the DDH assumption. The quadruple (g, h, u, v) in a hiding key is in the DDH distribution, and the one in a binding key is in the uniform distribution. Thus, they are indistinguishable under the DDH assumption.
Finally, equivocality is verified by inspecting that \(r' = (r - \rho m) + \rho m'\) satisfies \(a = g^r / u^m = g^{r'} / u^{m'}\) and \(b = h^r / v^m = h^{r'} / v^{m'}\).
\(\square \)
We present a \(\mathsf {\varSigma }\)-protocol \(\varPi ^{\textsf{bind}}\) for proving that \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\) is a binding key. We assume that group generator \(\mathcal{G}\) is transparent, i.e., \((\mathbb {G}, q, g) \in \mathcal{G}(\ensuremath {1^\ensuremath {\lambda }})\) can be verified publicly, and focus on the relation among (g, h, u, v). Concretely, the proof is for the following relation:
Inequality \(\rho _1 \ne \rho _2\) is shown by checking \(d_1^{(\rho _1 - \rho _2)} \ne 1_{\mathbb {G}}\) for a random generator \(d_1\).
[ \(\varPi ^{\textsf{bind}}\) : Proof of Binding Key]
-
Prover’s private input is \((\rho _1, \rho _2)\), and the common input to the prover and verifier is \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\).
-
Prover computes
, \(d_2 := d_1^{(\rho _1 - \rho _2)}\),
, \(a_1 := g^{r_1}\), \(a_2 := h^{r_2}\), \(a_3 := d_1^{r_1 - r_2}\), and sends \((a_1, a_2, a_3, d_1, d_2)\) to the verifier.
-
Verifier selects
and send it to Prover.
-
Prover computes \(z_1 = r_1 - c\, \rho _1\), \(z_2 = r_2 - c\, \rho _2\), and send \((z_1, z_2)\) to Verifier
-
Verifier accepts if \(a_1 = g^{z_1} u^{c}\), \(a_2 = h^{z_2} v^{c}\), \(a_3 = d_1^{z_1 - z_2} d_2^{c}\), \(d_1 \ne 1_{\mathbb {G}}\), and \(d_2 \ne 1_{\mathbb {G}}\). Reject, otherwise.
Theorem 11
\(\varPi ^{\textsf{bind}}\) is a three-round public-coin proof protocol for relation \(R^{\textsf{bind}}\). It is complete, 2-special sound, and honest verifier zero-knowledge.
Proof
We focus on soundness and zero-knowledge properties since others are direct from the construction. To prove 2-special soundness, we construct an extractor, \(\mathcal E\), as follows. Given a colliding transcript \((\ensuremath {\textsf{ck}}, a_1, a_2, a_3, d_1, d_2, c, z_1, z_2, c', z'_1, z'_2)\) that satisfies
\(c \ne c'\), \(d_1 \ne 1\), and \(d_2 \ne 1\), extractor \(\mathcal E\) computes
and outputs \((\rho _1,\rho _2)\).
To verify that \(\mathcal E\) is correct, observe that, from (2) and (3):
Also, from (4),
Since \(d_1 \ne 1\) and \(d_2 \ne 1\), \(\log _{d_1} d_2 \ne 0\). Thus, we have \(\rho _1 - \rho _2 \ne 0\), proving \(\rho _1 \ne \rho _2\).
To prove honest verifier zero-knowledge, we construct a simulator, \(\ensuremath {{\mathcal {S}}}\), as follows. Given instance \(\ensuremath {\textsf{ck}}= (\mathbb {G}, g, h, u, v)\), \(\ensuremath {{\mathcal {S}}}\) picks \(c, z_1, z_2\) uniformly and independently of \(\ensuremath {\mathbb {Z}}_q\). It also chooses \(d_1\) and \(d_2\) uniformly and independently of \(\mathbb {G}\). It then computes \(\tilde{a}_1 := g^{\tilde{z}_1} u^{c}\), \(\tilde{a}_2 := h^{\tilde{z}_2} v^{c}\), and \(\tilde{a}_3 := d_1^{\tilde{z}_1 - \tilde{z}_2} d_2^{c}\). Finally, it outputs \((a_1, a_2, a_3, d_1, d_2, c, z_1, z_2)\).
We show that the above output from the simulator is computationally indistinguishable from that observed in a real protocol run. We construct a hybrid as follows. Given DDH question \(Q:=(g, A, B, C)\) relative to \(\mathcal{G}(1^n)\), we set \(u=A\), \(v = h^{\rho _2}\), \(d_1=B\) and \(d_2 = C B^{-\rho _2}\), and create other variables as prescribed by the simulator. This implies \(\rho _1 = \log _g A\). If Q is in the DDH distribution, \(C=B^{\rho _1}\). We then have \(d_2 = B^{\rho _1 - \rho _2}\). Thus, the transcript is in the same distribution as the real prover outputs. On the other hand, if Q is in a random distribution, \(d_2\) distributes uniformly as in the simulated transcript due to the randomness of C. Accordingly, the simulated and real transcripts are indistinguishable if the DDH assumption holds for \(\mathcal{G}(1^n)\). This concludes the proof of honest verifier computational zero-knowledge of \(\varPi ^{\textsf{bind}}\).
\(\square \)
Rights and permissions
Copyright information
© 2024 International Association for Cryptologic Research
About this paper
Cite this paper
Abe, M., Bogdanov, A., Ohkubo, M., Rosen, A., Shang, Z., Tibouchi, M. (2024). CDS Composition of Multi-round Protocols. In: Reyzin, L., Stebila, D. (eds) Advances in Cryptology – CRYPTO 2024. CRYPTO 2024. Lecture Notes in Computer Science, vol 14928. Springer, Cham. https://doi.org/10.1007/978-3-031-68400-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-68400-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-68399-2
Online ISBN: 978-3-031-68400-5
eBook Packages: Computer ScienceComputer Science (R0)