1 identity-based zero-knowledge jonathan katz rafail ostrovsky michael rabin u. maryland u.c.l.a....

21
1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U.

Upload: anahi-samuel

Post on 15-Dec-2015

225 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

1

Identity-Based Zero-Knowledge

Jonathan Katz Rafail Ostrovsky Michael Rabin

U. Maryland U.C.L.A. Harvard U.

Page 2: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

2

History: recall original ZK motivation of GMR

• Prover can interactively convince verifier that x is in L

• Later, verifier can not convince someone else

• This prevents off-line plagiarism (i.e. Verifier later claiming the proof as his own).

Page 3: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

3

What about on-line Adv?

• Verifier can play man-in-the-middle

• Handled by the “designated verifier proofs”– [Jackobson,Sako, Impagliazzo], others

• This LIMITS the dissemination of proofs!

Page 4: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

4

What we want…

• To publish the proofs as widely as possible with the authors names

• Prevent plagiarism

• So, why not use NIZK?

Page 5: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

5

NIZK reminder [BFM]

• Common reference string (R.S.)

• Prover sends a single message

• Its transferable

• Its ZK:– Can simulate the same view [BDPM]– Can simulate with the same R.S.

[DDOPS]

Page 6: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

6

So are we done?

• Any verifier can take a NIZK proof, and either

• change it a bit, but still keep it valid or

(The first point can be addressed with non-malleable NIZK [DDN][S][DDPOS])

• claim it as his own and simply copy

Page 7: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

7

Non-Malleable NIZK• Non-malleability [DDN] “can not constructed related

encrypted msg”

• Non-malleability for NIZK [S][DDOPS] “whatever the verifier can prove after seeing a prove, it can do without seeing the proof”

Technical points:

• (1) generation of CRS;

• (2) 1 thm vs. many theorems;

• (3) adaptivity;

• (4) adv. challenges and the guarantees

• So, use the strongest def, are we done?

Page 8: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

8

What is the def. of preventing plagiarism?

• You have an NP theorem and a witness

• You want is transferable

• You have your name (id) as part of it…

• Want to “bind” the proof to your name (id) such that nobody can change the proof to a different id’

Page 9: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

9

ID-ZK• This talk we concentrate on NIZK (but the

notion applies to interactive setting as well)

• A new notion: NIZK with extractable identity:

• Prover(id,x,w,CRS) proof

• 2 public algs: – check correctness – extract id from proof

• ZK: for all x in L, and all id, can generate comp indist. View. (1 thm or multiple thms).

• Sound (w.h.p. can not “cheat”)

Page 10: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

10

Security of ID-ZK

• Sound

• Can not change identities

• Informally: no poly-time Adv. Can take one or several ID-ZK proofs, and construct a proof for a new id of an “interesting” theorem

• Interesting something can Adv. Could not do without any help.

Page 11: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

11

Security of ID-ZK (cont.)

• NIZK with extractable identity is ID-ZK if:

• Adv asks for ID-ZK proofs of different theorems, and different id’s

• Adv comes up with a proof of a thm with a new id

• Simulator can output comp. indist. Distribution of thms with new id without any ID-ZK proofs.

• again several variants of what Adv can ask, the strongest is simulation-soundness

Page 12: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

12

Remarks about the model

•PK-infrastructure – does it help? (i.e. what if the prover “signs” his proof?)

•No, the adv can just get rid of the signature and substitute his own!

Page 13: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

13

Remarks about the model (cont.)

• NIZK with a single random string – what does security mean? (since simulator must have a trapdoor info)

• The point is that we can do the proof without the trapdoor – if there is an adv who can cheat, the proof implies that we can use it to derive the contradiction!

Page 14: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

14

How easy is it to construct?

Also, what is the connection to NIZK in the non-interactive

setting?

Page 15: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

15

Why not use non-mall NIZK?

• Claim 1: there exists non-malleable NIZK proofs which are not ID-ZK.

• Claim2: there exists ID-ZK NIZK proofs that are not non-malleable NIZK.

Page 16: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

16

Why not use non-mall NIZK?

• Claim 1: there exists non-malleable NIZK proofs which are not ID-ZK.

• Standard non-mall NIZK do not have any ID. I can simply copy the proof and claim it as my own

• Remark: [DDN] showed how with ID’s non-mall NIZK is easier to build, this is different!

Page 17: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

17

Why not use non-mall NIZK?

• Claim2: there exists ID-ZK proofs that are not non-malleable.

• Proof idea: take ID-ZK proof, where we attach the first (undetermined) bit. This is malleable, but can still be shown to be ID-ZK!

Page 18: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

18

ID-ZK are closely related to non-mall NIZK

• Claim 3: assuming any non-mall NIZK we can construct ID-ZK NIZK.

• Claim 4: assuming any ID-ZK NIZK, we can construct non-mall NIZK

Page 19: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

19

ID-ZK are closely related to non-mall NIZK

• Claim 3: assuming any non-mall NIZK we can construct ID-ZK

• given (x,w,id) we construct ID-ZK: as follows:

• Define langue L’(x,id): “either x in L or (a new portion) of CRS is a commitment to id”.

• Send is ID-ZK (id, non-mall-NIZK for L’).

• Intuition: if can create new id, violates non-malleability!

Page 20: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

20

ID-ZK are closely related to non-mall NIZK

• Claim 4: assuming any ID-ZK we can construct non-mall NIZK

• Proof idea: use as ID a signature public-key, i.e. id = PK.

• Let B = id-zk(id,x in L)

• Send (id; B; signpk(B))

• Note: same proof-structure works for interactive case.

Page 21: 1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U

21

CONCLUSIONS• Many previous works (including

DDN) used identities in constructions but this is the first formal definition of binding names to proofs.

• Our definition is the most interesting part, seems to be a useful building block.

• What about application-specific efficient implementations?