PROOFS THAT YIELD NOTHING BUT THEIR VALIDITY OR ALL LANGUAGES IN NP HAVE ZERO-KNOWLEDGE PROOF SYSTEMS

被引:24
作者
GOLDREICH, O
MICALI, S
WIGDERSON, A
机构
[1] MIT, COMP SCI LAB, CAMBRIDGE, MA 02139 USA
[2] HEBREW UNIV JERUSALEM, INST MATH & COMP SCI, JERUSALEM, ISRAEL
关键词
CRYPTOGRAPHIC PROTOCOLS; FAULT-TOLERANT DISTRIBUTED COMPUTING; GRAPH ISOMORPHISM; INTERACTIVE PROOFS; METHODOLOGICAL DESIGN OF PROTOCOLS; NP; ONE-WAY FUNCTIONS; PROOF SYSTEMS; ZERO-KNOWLEDGE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the generality and wide applicability of zero-knowledge proofs, a notion introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and interactive proofs that, for the members of a language, efficiently demonstrate membership in the language without conveying any additional knowledge. All previously known zero-knowledge proofs were only for number-theoretic languages in NP and CoNP. Under the assumption that secure encryption functions exist or by using "physical means for hiding information," it is shown that all languages in NP have zero-knowledge proofs. Loosely speaking, it is possible to demonstrate that a CNF formula is satisfiable without revealing any other property of the formula, in particular, without yielding neither a satisfying assignment nor properties such as whether there is a satisfying assignment in which x1 = x3 etc. It is also demonstrated that zero-knowledge proofs exist "outside the domain of cryptography and number theory." Using no assumptions, it is shown that both graph isomorphism and graph nonisomorphism have zero-knowledge interactive proofs. The mere existence of an interactive proof for graph nonisomorphism is interesting, since graph nonisomorphism is not known to be in NP and hence no efficient proofs were known before for demonstrating that two graphs are not isomorphic.
引用
收藏
页码:691 / 729
页数:39
相关论文
共 68 条
[1]  
Aho A. V., 1974, DESIGN ANAL COMPUTER
[2]  
Aiello W., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P439, DOI 10.1109/SFCS.1987.47
[3]  
Aiello W., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P368, DOI 10.1109/SFCS.1986.36
[4]   RSA AND RABIN FUNCTIONS - CERTAIN PARTS ARE AS HARD AS THE WHOLE [J].
ALEXI, W ;
CHOR, B ;
GOLDREICH, O ;
SCHNORR, CP .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :194-209
[5]  
ALON N, 1985, UNPUB FULLY POLYNOMI
[6]  
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[7]  
[Anonymous], 1988, P 20 ANN ACM S THEOR, DOI 10.1145/62212.62213
[8]  
[Anonymous], 1971, STOC 71, DOI DOI 10.1145/800157.805047
[9]  
Babai L., 1983, 24th Annual Symposium on Foundations of Computer Science, P162, DOI 10.1109/SFCS.1983.10
[10]   ARTHUR-MERLIN GAMES - A RANDOMIZED PROOF SYSTEM, AND A HIERARCHY OF COMPLEXITY CLASSES [J].
BABAI, L ;
MORAN, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 36 (02) :254-276