Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

On Non-Black-Box Proofs of Security Boaz Barak Princeton.
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Coin Tossing With A Man In The Middle Boaz Barak.
Are PCPs Inherent in Efficient Arguments? Guy Rothblum, MIT ) MSR-SVC ) IAS Salil Vadhan, Harvard University.
Strict Polynomial-Time in Simulation and Extraction Boaz Barak & Yehuda Lindell.
Function Technique Eduardo Pinheiro Paul Ilardi Athanasios E. Papathanasiou The.
Complexity Theory Lecture 6
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Salil Vadhan Minh Nguyen Shien Jin Ong Harvard University.
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
Shortest Vector In A Lattice is NP-Hard to approximate
Derandomization & Cryptography Boaz Barak, Weizmann Shien Jin Ong, MIT Salil Vadhan, Harvard.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Zero Knowledge Proofs(2) Suzanne van Wijk & Maaike Zwart
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann & Microsoft Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann Institute Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH  P #P. –Program checking and hardness on the average of the permanent.
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
The Complexity of Zero-Knowledge Proofs Salil Vadhan Harvard University.
IP=PSPACE Nikhil Srivastava CPSC 468/568. Outline IP Warmup: coNP  IP by arithmetization PSPACE (wrong) attempt at PSPACE  IP (revised) PSPACE  IP.
Complexity Theory Lecture 1 Lecturer: Moni Naor. Computational Complexity Theory Study the resources needed to solve computational problems –Computer.
1 Vipul Goyal Microsoft Research India Non-Black-Box Simulation in the Fully Concurrent Setting.
Lecture 16: Relativization Umans Complexity Theory Lecturess.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
A survey on derandomizing BPP and AM Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
A Parallel Repetition Theorem for Any Interactive Argument Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before.
1 Slides by Roel Apfelbaum & Eti Ezra. Enhanced by Amit Kagan. Adapted from Oded Goldreich’s course lecture notes.
1 Adapted from Oded Goldreich’s course lecture notes.
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
Zero-Knowledge Proof System Slides by Ouzy Hadad, Yair Gazelle & Gil Ben-Artzi Adapted from Ely Porat course lecture notes.
–Def: A language L is in BPP c,s ( 0  s(n)  c(n)  1,  n  N) if there exists a probabilistic poly-time TM M s.t. : 1.  w  L, Pr[M accepts w]  c(|w|),
1 Zaps and Apps Cynthia Dwork Microsoft Research Moni Naor Weizmann Institute of Science.
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
Impossibility and Feasibility Results for Zero Knowledge with Public Keys Joël Alwen Tech. Univ. Vienna AUSTRIA Giuseppe Persiano Univ. Salerno ITALY Ivan.
Optimal Proof Systems and Sparse Sets Harry Buhrman, CWI Steve Fenner, South Carolina Lance Fortnow, NEC/Chicago Dieter van Melkebeek, DIMACS/Chicago.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti, Abhishek Jain and Omer Paneth 1.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
Statistical Zero-Knowledge:
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge Oded Goldreich (Weizmann) Amit Sahai (MIT) Salil Vadhan (MIT)
Topic 36: Zero-Knowledge Proofs
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Yi Deng IIE,Chinese Academy of Sciences (Beijing) Joint work with
Probabilistic Algorithms
Information Complexity Lower Bounds
Derandomization & Cryptography
On the Size of Pairing-based Non-interactive Arguments
Zero Knowledge Anupam Datta CMU Fall 2017
HIERARCHY THEOREMS Hu Rui Prof. Takahashi laboratory
Pseudorandomness when the odds are against you
cryptographic protocols 2014, lecture 12 Getting full zero knowledge
How to Delegate Computations: The Power of No-Signaling Proofs
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Fiat-Shamir for Highly Sound Protocols is Instantiable
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Jens Groth and Mary Maller University College London
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short

Interactive Proof Systems [GMR] P Completeness: If x 2 L, P can cause V to output “Accept” w.p. 1 Soundness: If x  L, no matter what P does, V will output “Reject” w.h.p. V x Accept/Reject

Interactive Proof Systems [GMR] P V x Accept/Reject An interactive proof system is zero-knowledge (ZK) if verifier cannot learn anything new after interacting with the prover. That is, no matter what V does, it will not learn anything that it couldn’t have learned by itself (without any interaction with prover).

Interactive Proof Systems [GMR] P V x Accept/Reject Formalized by showing that for every verifier there exists a simulator – a non-interactive alg whose output is indist from verifier’s view in the interaction. S(, ) ~ Verifier’s strategy (Circuit / TM) Public input (X) Verifier’s view Two r.v. X,Y are indist if 8 poly circuit D | Pr[ D(X)=1 ] – Pr[ D(Y)=1 ] | < n -  (1)

Some Known Results Under assumptions, 9 ZK proof for every language in NP. [GMW] In fact, 9 such proof that only uses a constant number of communication rounds. [FS,BCY,GKa] A proof system for a non-trivial language that is ZK w.r.t. verifiers that use a non-uniform strategy must have at least 3 rounds. [GO] A ZK proof for a non-trivial* language must be interactive (i.e., have at least 2 rounds) [GO]

A Natural Question Is there a 2-round proof system for NP that is ZK w.r.t. uniform verifiers? We show that under assumptions, the answer is NO. That is, we show that under reasonable assumptions, there is no 2-round ZK proof* system for a language not in co-NP. * The result is for (statistically sound) proof systems with perfect completeness.

The Public-Coin Case Thm 1: Let E=Dtime(2  n) ). If NCC(E)=2  (n) then there is no 2-round ZK public-coins proof system for a non-trivial language. PV  2 R {0,1} n  A 2-round proof system is public-coins if the verifier sends its entire random tape as its message. Accept iff A(x, ,  )=1 x

Thm 1: If NCC(E)=2  (n) and L has a 2-round ZK public-coins proof then L 2 BPP. PV  2 R {0,1} n  Accept iff A(x, ,  )=1 Proof: Fix x  L. Define  2 {0,1} n as good if 8  A(x, ,  )=0. x 1. Pr  2 {0,1} n [  is good ] > ½ Note that: 2. Can test if  is good in non-deterministic time n c, where n c is running time of A. Under assumption, 9 poly-time G:{0,1} O(log n)  {0,1} n s.t. Pr  =G(s) [  is good ] > ¼ [KvM]

PV*  G(s)  Accept iff A(x, ,  )=1 x Define verifier V* that sends  =G(s) for s 2 R {0,1} O(log n) Let S be a simulator for V*. For every x 2 L, S should output a pair ( ,  ) that is indist from a real execution. For every x,  =G(s), we define S(x,  ) to be result of following poly-time process: Run S(x) many times till output is of form ( ,  ). Output . In particular, if x 2 L, then Pr ( ,  )=S(x) [ A(x, ,  )=1 ] > 1 – n  (1)

To decide if x 2 L: 1.Choose s 2 R {0,1} O( log n), let  =G(s). Note that  is good w.p. ¸ ¼ 2. Compute  =S(  ) 3. Output A(x, ,  ) For every x,  =G(s), we define S(x,  ) to be result of following poly-time process: Run S(x) many times till output is of form ( ,  ). Output . We get that L 2 BPP:

The Private-Coin Case Thm 2: If  2 -CC(E)=2  (n) then there is no 2-round ZK proof system for a L  co-NP. PV  (r)  Accept iff A(x, ,  ;r)=1 x

Thm 2: If  2 -CC(E)=2  (n) and L has a 2-round ZK proof system then L 2 co-NP PV  (r)  Accept iff A(x, ,  ;r)=1 x Proof: Fix x  L. Define  =  (r) as good if 8  9 r s.t. A(x, ,  ;r)=0 Under assumption, 9 poly-time G:{0,1} O(log n)  {0,1} n s.t. Pr  =G(s) [  is good ] > ¼ [KvM]

Define V* as before to use r=G(s), and define S to be the simulator for V*. PV  (r)  Accept iff A(x, ,  ;r)=1 x Again, for every x,  =G(s), we define S(x,  ) to be result of following poly-time process: Run S(x) many times till output is of form ( ,  ). Output . Note that if x 2 L, and  =P(x,  ) then 8 r A(x, , ,r)=1 Therefore w.h.p. this also holds for S(x,  )

To decide if x 2 L: 1.Choose s 2 R {0,1} O( log n), let r 0 =G(s) and  (r 0 ). Note that  is good w.p. ¸ ¼ 2. Compute  =S(x,  ) 3. Output A(x, ,  ;r) where r=r 0. Consider the following attempted algorithm for L: If x  L then w.p. ¸ ¼ 9 r s.t. A(x, ,  ;r)=0. However, it may be that A(x, ,  ;r 0 )=1 ! If x 2 L then w.h.p. 8 r A(x, ,S(x,  );r)=1. However, we can choose r in step 3 via non-det guess and get that L 2 co-AM!

Other Results 1. Under assumptions, there is no 2-round ZK proof system for NP w/ perfect completeness. 2. There is no constant-round public-coin proof system that is (even bounded) resettable ZK. 3. Under assumptions, there is no constant-round ZK strong proof of knowledge [G]. Tightness results: 1 & 3 use essentially tight assumptions. Furthermore, similar assumptions are required to rule out that  (log n)-wise parallel 3COL/HAM are ZK. 1 & 3 use essentially tight assumptions. Furthermore, similar assumptions are required to rule out that  (log n)-wise parallel 3COL/HAM are ZK. There is an argument system for NP that is constant-round and bounded resettable ZK. There is an argument system for NP that is constant-round and bounded resettable ZK.

Conclusions Still several open questions regarding power of (non-BB) zero knowledge. This work shows that there is a difference between arguments and proofs, and that sometimes one must use (uncommon) computational assumptions. One of the most important open questions – prove the following under reasonable assumptions: Conjecture: There is no constant-round public-coins zero-knowledge proof system for NP.