Round-optimal privacy-preserving protocols with smooth projective hash functions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In 2008, Groth and Sahai proposed a powerful suite of techniques for constructing non-interactive zero-knowledge proofs in bilinear groups. Their proof systems have found numerous applications, including group signature schemes, anonymous voting, and anonymous credentials. In this paper, we demonstrate that the notion of smooth projective hash functions can be useful to design round-optimal privacy-preserving interactive protocols. We show that this approach is suitable for designing schemes that rely on standard security assumptions in the standard model with a common-reference string and are more efficient than those obtained using the Groth-Sahai methodology. As an illustration of our design principle, we construct an efficient oblivious signature-based envelope scheme and a blind signature scheme, both round-optimal.

Original languageEnglish
Title of host publicationTheory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings
PublisherSpringer Verlag
Pages94-111
Number of pages18
ISBN (Print)9783642289132
DOIs
Publication statusPublished - 1 Jan 2012
Event9th Theory of Cryptography Conference, TCC 2012 - Taormina, Sicily, Italy
Duration: 19 Mar 201221 Mar 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7194 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th Theory of Cryptography Conference, TCC 2012
Country/TerritoryItaly
CityTaormina, Sicily
Period19/03/1221/03/12

Fingerprint

Dive into the research topics of 'Round-optimal privacy-preserving protocols with smooth projective hash functions'. Together they form a unique fingerprint.

Cite this