Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control

Zvika Brakerski, Yael Kalai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Consider an access policy for some resource which only allows access to users of the system who own a certain set of attributes. Specifically, we consider the case where such an access structure is defined by some monotone function f : {0, 1}(N) -> {0, 1}, belonging to some class of function F (e.g. conjunctions, space bounded computation), where N is the number of possible attributes.In this work we show that any succinct single-round delegation scheme for the function class F can be converted into a succinct single-round private access control protocol. That is, a verifier can be convinced that an approved user (i.e. one which holds an approved set of attributes) is accessing the system, without learning any additional information about the user or the set of attributes.As a main tool of independent interest, we show that assuming a quasi-polynomially secure two-message oblivious transfer scheme with statistical sender privacy (which can be based on quasi-polynomial hardness of the DDH, QR, DCR or LWE assumptions), we can convert any single-round protocol into a witness indistinguishable one, with similar communication complexity.
Original languageEnglish
Title of host publicationPublic-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
EditorsAggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
PublisherSpringer Verlag
Pages97-123
Number of pages27
Volume12111
ISBN (Electronic)978-3-030-45388-6
ISBN (Print)9783030453879
DOIs
StatePublished - 29 Apr 2020
Event23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020 - Edinburgh, United Kingdom
Duration: 4 May 20207 May 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12111 LNCS

Conference

Conference23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020
Country/TerritoryUnited Kingdom
CityEdinburgh
Period4/05/207/05/20

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Cite this