Skip to Main content Skip to Navigation
Conference papers

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting

Fabrice Benhamouda 1, 2, 3 Geoffroy Couteau 1, 2, 3 David Pointcheval 1, 3, 2 Hoeteck Wee 1, 2, 3
3 CASCADE - Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities
DI-ENS - Département d'informatique de l'École normale supérieure, Inria Paris-Rocquencourt, CNRS - Centre National de la Recherche Scientifique : UMR 8548
Abstract : We introduce \emph{implicit zero-knowledge} arguments (iZK) and simulation-sound variants thereof (SSiZK); these are lightweight alternatives to zero-knowledge arguments for enforcing semi-honest behavior. Our main technical contribution is a construction of efficient two-flow iZK and SSiZK protocols for a large class of languages under the (plain) DDH assumption in cyclic groups in the common reference string model. As an application of iZK, we improve upon the round-efficiency of existing protocols for securely computing inner product under the DDH assumption. This new protocol in turn provides privacy-preserving biometric authentication with lower latency.
Document type :
Conference papers
Complete list of metadata
Contributor : Fabrice Benhamouda <>
Submitted on : Thursday, August 27, 2015 - 5:12:10 PM
Last modification on : Thursday, July 1, 2021 - 5:58:06 PM




Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee. Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. CRYPTO 2015, Aug 2015, Santa Barbara, United States. pp.23, ⟨10.1007/978-3-662-48000-7_6⟩. ⟨hal-01187833⟩



Record views