Zero Knowledge Proofs and Sigma Protocols Flashcards

1
Q

Definition of language

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of decision problem and relation with search problem

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of complexity classes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of NP complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NP-complete problems and relation between P and NP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of NP-complete problems

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

P vs NP wrt one-way functions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition of k-round interaction

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of IP complexity class

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP class with respect to PSPACE class and NP class with example

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition of graph and of graph isomorphism

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GNI and IP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prove that GNI belongs to IP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of Zero Knowledge Proof

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of Honest-Verifier Zero Knowledge

16
Q

GI and PKZ

17
Q

Prove that GI belongs to PZK

18
Q

Prove that if there exists a one-way function then NP belongs / equal to CZK

19
Q

Definition of proof of knowledge

A

cheating is as difficult as crafting a witness + formal def with p and k

20
Q

Definition of Zero-Knowledge Proof of Knowledge

21
Q

GI and PZKPoK

22
Q

Prove that GI belongs to PZKPoK

23
Q

Definition of Sigma Protocol: what is it, what is it made of and which properties does it have

24
Sigma protocol for Graph Isomorphism: construction, proof and soundness error
25
Sigma protocol for Discrete Logarithm: construction, proof and soundness error
26
Sigma protocol for Square Root Problem: construction, proof and soundness error
resp = x^c * r
27
Definition of Identification Scheme
4 algo gen, P1 p2 v gen prende 1^lambda e genera pk e sk
28
Experiment for Identification Scheme
29
Definition of Secure Identification Scheme
30
Theorem: Sigma protocols as secure identification schemes and proof
**Theorem** Let L be language in NP and assume that there exists no PPT adversary that given x ∈ L finds a witness for x with non-negligible probability. Let Π be a Σ-protocol for a ZKPoK for L, together with an algorithm to generate pairs (x , w ) with x ∈ L and w a witness of this fact. Then Π is a secure identification protocol, where the prover has public key x and secret key w. **Proof**. The completeness of Π implies that Π is indeed an identification protocol. The special soundness of Π implies that an adversary A can fool the verifier only by finding the secret key w, which is infeasible by hypothesis. Finally, the honest verifier zero-knowledge of Π implies that the adversary A gains no information from the oracle Transsk, since the transcripts that it produces can be simulated by an oracle that does not know sk.
31
Security parameter lambda for an identification protocol
* in order to achieve a security level λ, the parameters must be selected so that solving the search problem for L (with the best known algorithms) has average-case complexity proportional to 2λ. * Moreover, to achieve a security level λ, the number R of rounds should be at least λ/log(1/p), where p is the soundness error of the Σ-protocol and log is the logarithm in base 2. This ensures that the probability that a cheater passes the identification is less than 2−λ, and protects from brute-force attacks.
32
Communication cost
33
Construction and proof of Schnorr Identification Protocol
= sigma protocol per DL parte tutto da un gruppo e i parametri x e c vengono presi da Z p