The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Le concept de dissimulation des témoins a été proposé par Feige et Shamir comme un assouplissement naturel de la connaissance nulle. Les constructions antérieures du protocole de dissimulation des témoins pour une distribution générale dure sur le langage NP comprennent au moins trois tours. Dans cet article, nous construisons un protocole de masquage de témoin en deux tours pour toutes les distributions matérielles sur le langage NP. Notre construction est basée sur deux primitives : l'obfuscation de points et le schéma de chiffrement adaptatif des témoins.
Qihua NIU
China University of Petroleum (Huadong)
Tongjiang YAN
China University of Petroleum (Huadong),Fujian Province University
Yuhua SUN
China University of Petroleum (Huadong),Shandong Computer Science Center (National Supercomputer Center in Jinan, Shandong Provincial Key Laboratory of Computer Networks
Chun'e ZHAO
China University of Petroleum (Huadong)
Fei TANG
Chongqing University of Posts and Telecommunications
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Qihua NIU, Tongjiang YAN, Yuhua SUN, Chun'e ZHAO, Fei TANG, "Two-Round Witness Hiding Protocol" in IEICE TRANSACTIONS on Fundamentals,
vol. E101-A, no. 6, pp. 953-960, June 2018, doi: 10.1587/transfun.E101.A.953.
Abstract: The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E101.A.953/_p
Copier
@ARTICLE{e101-a_6_953,
author={Qihua NIU, Tongjiang YAN, Yuhua SUN, Chun'e ZHAO, Fei TANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Two-Round Witness Hiding Protocol},
year={2018},
volume={E101-A},
number={6},
pages={953-960},
abstract={The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.},
keywords={},
doi={10.1587/transfun.E101.A.953},
ISSN={1745-1337},
month={June},}
Copier
TY - JOUR
TI - Two-Round Witness Hiding Protocol
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 953
EP - 960
AU - Qihua NIU
AU - Tongjiang YAN
AU - Yuhua SUN
AU - Chun'e ZHAO
AU - Fei TANG
PY - 2018
DO - 10.1587/transfun.E101.A.953
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E101-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 2018
AB - The concept of witness hiding was proposed by Feige and Shamir as a natural relaxation of zero-knowledge. Prior constructions of witness hiding protocol for general hard distribution on NP language consist of at least three rounds. In this paper we construct a two-round witness hiding protocol for all hard distributions on NP language. Our construction is based on two primitives: point obfuscation and adaptive witness encryption scheme.
ER -