Zero Knowledge Proofs and Sigma Protocols Flashcards

1
Q

Definition of language

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of decision problem and relation with search problem

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of complexity classes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of NP complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NP-complete problems and relation between P and NP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of NP-complete problems

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

P vs NP wrt one-way functions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition of k-round interaction

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of IP complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP class with respect to PSPACE class and NP class with example

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition of graph and of graph isomorphism

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GNI and IP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prove that GNI belongs to IP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of Zero Knowledge Proof

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of Honest-Verifier Zero Knowledge

A
16
Q

GI and PKZ

A
17
Q

Prove that GI belongs to PZK

A
18
Q

Prove that if there exists a one-way function then NP belongs / equal to CZK

A
19
Q

Definition of proof of knowledge

A

cheating is as difficult as crafting a witness + formal def with p and k

20
Q

Definition of Zero-Knowledge Proof of Knowledge

A
21
Q

GI and PZKPoK

A
22
Q

Prove that GI belongs to PZKPoK

A
23
Q

Definition of Sigma Protocol: what is it, what is it made of and which properties does it have

A
24
Q

Sigma protocol for Graph Isomorphism: construction, proof and soundness error

A
25
Q

Sigma protocol for Discrete Logarithm: construction, proof and soundness error

A
26
Q

Sigma protocol for Square Root Problem: construction, proof and soundness error

A

resp = x^c * r

27
Q

Definition of Identification Scheme

A

4 algo
gen, P1 p2 v

gen prende 1^lambda e genera pk e sk

28
Q

Experiment for Identification Scheme

A
29
Q

Definition of Secure Identification Scheme

A
30
Q

Theorem: Sigma protocols as secure identification schemes and proof

A

Theorem
Let L be language in NP and assume that there exists no PPT adversary that given x ∈ L finds a witness for x with non-negligible probability. Let Π be a Σ-protocol for a ZKPoK for L, together with an algorithm to generate pairs (x , w ) with x ∈ L and w a witness of this fact. Then Π is a secure identification protocol, where the prover has public key x and secret key w.

Proof.
The completeness of Π implies that Π is indeed an identification protocol. The special soundness of Π implies that an adversary A can fool the verifier only by finding the secret key w, which is infeasible by hypothesis. Finally, the honest verifier zero-knowledge of Π implies that the adversary A gains no information from the oracle Transsk, since the transcripts that it produces can be simulated by an oracle that does not know sk.

31
Q

Security parameter lambda for an identification protocol

A
  • in order to achieve a security level λ, the parameters must be selected so that solving the search problem for L (with the best known algorithms) has average-case complexity proportional to 2λ.
  • Moreover, to achieve a security level λ, the number R of rounds should be at least λ/log(1/p), where p is the soundness error of the Σ-protocol and log is the logarithm in base 2.

This ensures that the probability that a cheater passes the identification is less than 2−λ, and protects from brute-force attacks.

32
Q

Communication cost

A
33
Q

Construction and proof of Schnorr Identification Protocol

A

= sigma protocol per DL

parte tutto da un gruppo e i parametri x e c vengono presi da Z p