Disjunctions for Hash Proof Systems: New Constructions and Applications

Conference paper

DOI: 10.1007/978-3-662-46803-6_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9057)
Cite this paper as:
Abdalla M., Benhamouda F., Pointcheval D. (2015) Disjunctions for Hash Proof Systems: New Constructions and Applications. In: Oswald E., Fischlin M. (eds) Advances in Cryptology - EUROCRYPT 2015. EUROCRYPT 2015. Lecture Notes in Computer Science, vol 9057. Springer, Berlin, Heidelberg

Abstract

Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt’02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be seen as implicit proofs of membership for certain languages. As a result, by extending the family of languages that they can handle, one often obtains new applications or new ways to understand existing schemes. In this paper, we show how to construct hash proof systems for the disjunction of languages defined generically over cyclic, bilinear, and multilinear groups. Among other applications, this enables us to construct the most efficient one-time simulation-sound (quasi-adaptive) non-interactive zero-knowledge arguments for linear languages over cyclic groups, the first one-round group password-authenticated key exchange without random oracles, the most efficient threshold structure-preserving chosen- ciphertext-secure encryption scheme, and the most efficient one-round password authenticated key exchange in the UC framework.

Keywords

Hash proof system Non-interactive zero-knowledge proof Group password authenticated key exchange Threshold encryption Linearly homomorphic signature Structure preserving primitive 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© International Association for Cryptologic Research 2015

Authors and Affiliations

  1. 1.ENS, CNRS, INRIA, and PSLÉcole Normale SupérieureParisFrance

Personalised recommendations