Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Fine-Grained Verifier NIZK and Its Applications

  • Conference paper
  • First Online:
Public-Key Cryptography – PKC 2023 (PKC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13941))

Included in the following conference series:

  • 911 Accesses

Abstract

In this paper, we propose a new type of non-interactive zero-knowledge (NIZK), called Fine-grained Verifier NIZK (FV-NIZK), which provides more flexible and more fine-grained verifiability of proofs than standard NIZK that supports public verifiability and designated-verifier NIZK (DV-NIZK) that supports private verifiability. FV-NIZK has two statistically equivalent verification approaches:

  • a master verification using the master secret key msk;

  • a fine-grained verification using a derived secret key \(sk_d\), which is derived from msk w.r.t. d (which may stand for user identity, email address, vector, etc.).

We require unbounded simulation soundness (USS) of FV-NIZK to hold, even if an adversary obtains derived secret keys \(sk_d\) with d of its choices, and define proof pseudorandomness which stipulates the pseudorandomness of proofs for adversaries that are not given any secret key.

We present two instantiations of FV-NIZK for linear subspace languages, based on the matrix decisional Diffie-Hellman (MDDH) assumption. One of the FV-NIZK instantiations is pairing-free and achieves almost tight USS and proof pseudorandomness.

We illustrate the usefulness of FV-NIZK by showing two applications and obtain the following pairing-free schemes:

  • the first almost tightly multi-challenge CCA (mCCA)-secure inner-product functional encryption (IPFE) scheme without pairings;

  • the first public-key encryption (PKE) scheme that reconciles the inherent contradictions between public verifiability and anonymity. We formalize such PKE as Fine-grained Verifiable PKE (FV-PKE), which derives a special key from the decryption secret key, such that for those who obtain the derived key, they can check the validity of ciphertexts but the anonymity is lost from their views (CCA-security still holds for them), while for others who do not get the derived key, they cannot do the validity check but the anonymity holds for them.

    Our FV-PKE scheme achieves almost tight mCCA-security for adversaries who obtain the derived keys, and achieves almost tight ciphertext pseudorandomness (thus anonymity) for others who do not get any derived key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Note that the CRS of NIZK is contained in the public key of PKE, since the encryption algorithm of PKE involves NIZK proof generation which requires the CRS.

  2. 2.

    This entropy requirement is necessary to achieve verification equivalence, see Remark 1 in Sect. 3 for more discussions.

References

  1. Abdalla, M., Bourse, F., Caro, A.D., Pointcheval, D.: Simple functional encryption schemes for inner products. In: PKC 2015, vol. 9020, pp. 733–751 (2015)

    Google Scholar 

  2. Abdalla, M., Bourse, F., Caro, A.D., Pointcheval, D.: Better security for functional encryption for inner product evaluations. IACR Cryptol. ePrint Arch. 2016, 11 (2016)

    Google Scholar 

  3. Abe, M., David, B., Kohlweiss, M., Nishimaki, R., Ohkubo, M.: Tagged one-time signatures: tight security and optimal tag size. In: PKC 2013, vol. 7778, pp. 312–331 (2013)

    Google Scholar 

  4. Abe, M., Jutla, C.S., Ohkubo, M., Pan, J., Roy, A., Wang, Y.: Shorter QA-NIZK and SPS with tighter security. In: ASIACRYPT 2019, vol. 11923, pp. 669–699 (2019)

    Google Scholar 

  5. Abe, M., Jutla, C.S., Ohkubo, M., Roy, A.: Improved (almost) tightly-secure simulation-sound QA-NIZK with applications. In: ASIACRYPT 2018, pp. 627–656 (2018)

    Google Scholar 

  6. Agrawal, S., Libert, B., Stehlé, D.: Fully secure functional encryption for inner products, from standard assumptions. In: CRYPTO 2016, pp. 333–362 (2016)

    Google Scholar 

  7. Bellare, M., Goldwasser, S.: New paradigms for digital signatures and message authentication based on non-interative zero knowledge proofs. In: CRYPTO 1989, vol. 435, pp. 194–211 (1989)

    Google Scholar 

  8. Blazy, O., Kakvi, S.A., Kiltz, E., Pan, J.: Tightly-secure signatures from chameleon hash functions. In: PKC 2015, pp. 256–279 (2015)

    Google Scholar 

  9. Blazy, O., Kiltz, E., Pan, J.: (Hierarchical) identity-based encryption from affine message authentication. In: CRYPTO 2014, pp. 408–425 (2014)

    Google Scholar 

  10. Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: TCC 2011, vol. 6597, pp. 253–273 (2011)

    Google Scholar 

  11. Chen, J., Wee, H.: Fully, (almost) tightly secure IBE and dual system groups. In: CRYPTO 2013, vol. 8043, pp. 435–460 (2013)

    Google Scholar 

  12. Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: EUROCRYPT 2002, vol. 2332, pp. 45–64 (2002)

    Google Scholar 

  13. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.D.: Fuzzy extractors: Hhw to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  14. Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: STOC 1991, pp. 542–552 (1991)

    Google Scholar 

  15. Escala, A., Herold, G., Kiltz, E., Ràfols, C., Villar, J.L.: An algebraic framework for Diffie-Hellman assumptions. In: CRYPTO 2013, vol. 8043, pp. 129–147 (2013)

    Google Scholar 

  16. Gay, R., Hofheinz, D., Kiltz, E., Wee, H.: Tightly CCA-secure encryption without pairings. In: EUROCRYPT 2016, vol. 9665, pp. 1–27 (2016)

    Google Scholar 

  17. Gay, R., Hofheinz, D., Kohl, L.: Kurosawa-desmedt meets tight security. In: CRYPTO 2017, vol. 10403, pp. 133–160 (2017)

    Google Scholar 

  18. Groth, J., Ostrovsky, R., Sahai, A.: New techniques for noninteractive zero-knowledge. J. ACM 59(3), 1–35 (2012)

    Google Scholar 

  19. Han, S., et al.: Authenticated key exchange and signatures with tight security in the standard model. In: CRYPTO 2021, vol. 12828, pp. 670–700 (2021)

    Google Scholar 

  20. Han, S., Liu, S., Lyu, L., Gu, D.: Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. In: CRYPTO 2019, vol. 11693, pp. 417–447 (2019)

    Google Scholar 

  21. Hofheinz, D., Jager, T.: Tightly secure signatures and public-key encryption. Des. Codes Cryptogr. 80(1), 29–61 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  22. Hofheinz, D., Jia, D., Pan, J.: Identity-based encryption tightly secure under chosen-ciphertext attacks. In: ASIACRYPT 2018, vol. 11273, pp. 190–220 (2018)

    Google Scholar 

  23. Jutla, C.S., Roy, A.: Shorter quasi-adaptive NIZK proofs for linear subspaces. In: ASIACRYPT 2013, vol. 8269, pp. 1–20 (2013)

    Google Scholar 

  24. Libert, B., Joye, M., Yung, M., Peters, T.: Concise multi-challenge CCA-secure encryption and signatures with almost tight security. In: ASIACRYPT 2014, pp. 1–21 (2014)

    Google Scholar 

  25. Libert, B., Peters, T., Joye, M., Yung, M.: Compactly hiding linear spans - tightly secure constant-size simulation-sound QA-NIZK proofs and applications. In: ASIACRYPT 2015, vol. 9452, pp. 681–707 (2015)

    Google Scholar 

  26. Liu, X., Liu, S., Han, S., Gu, D.: Tightly CCA-secure inner product functional encryption scheme. Theor. Comput. Sci. 898, 1–19 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  27. Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990, pp. 427–437 (1990)

    Google Scholar 

  28. O’Neill, A.: Definitional issues in functional encryption. IACR Cryptol. ePrint Arch. 2010, 556 (2010)

    Google Scholar 

  29. Ràfols, C.: Stretching Groth-Sahai: NIZK proofs of partial satisfiability. In: TCC 2015, vol. 9015, pp. 247–276 (2015)

    Google Scholar 

  30. Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: FOCS 1999, pp. 543–553 (1999)

    Google Scholar 

  31. Tomida, J.: Tightly secure inner product functional encryption: multi-input and function-hiding constructions. In: ASIACRYPT 2019, pp. 459–488 (2019)

    Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their valuable comments and suggestions. Shengli Liu and Xiangyu Liu were partially supported by National Natural Science Foundation of China (NSFC No. 61925207), Guangdong Major Project of Basic and Applied Basic Research (2019B030302008), and the National Key R &D Program of China under Grant 2022YFB2701500. Shuai Han was partially supported by National Natural Science Foundation of China (Grant No. 62002223), Shanghai Sailing Program (20YF1421100), Young Elite Scientists Sponsorship Program by China Association for Science and Technology (YESS20200185), and Ant Group through CCF-Ant Research Fund (CCF-AFSG RF20220224). Dawu Gu is partially supported by the National Key Research and Development Project (Grant No. 2020YFA0712302).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shengli Liu or Shuai Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Liu, S., Han, S., Gu, D. (2023). Fine-Grained Verifier NIZK and Its Applications. In: Boldyreva, A., Kolesnikov, V. (eds) Public-Key Cryptography – PKC 2023. PKC 2023. Lecture Notes in Computer Science, vol 13941. Springer, Cham. https://doi.org/10.1007/978-3-031-31371-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31371-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31370-7

  • Online ISBN: 978-3-031-31371-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics