{"editor":[{"last_name":"Wang","first_name":"Xiaoyun","full_name":"Wang, Xiaoyun"},{"first_name":"Kazue","full_name":"Sako, Kazue","last_name":"Sako"}],"alternative_title":["LNCS"],"date_created":"2018-12-11T12:00:38Z","file":[{"file_id":"5048","access_level":"open_access","checksum":"ab879537385efc4cb4203e7ef0fea17b","creator":"system","date_updated":"2020-07-14T12:45:58Z","content_type":"application/pdf","file_size":482570,"file_name":"IST-2016-721-v1+1_513.pdf","date_created":"2018-12-12T10:14:00Z","relation":"main_file"}],"year":"2012","ddc":["004","005"],"date_published":"2012-12-01T00:00:00Z","language":[{"iso":"eng"}],"file_date_updated":"2020-07-14T12:45:58Z","author":[{"full_name":"Jain, Abhishek","first_name":"Abhishek","last_name":"Jain"},{"full_name":"Krenn, Stephan","first_name":"Stephan","orcid":"0000-0003-2835-9093","id":"329FCCF0-F248-11E8-B48F-1D18A9856A87","last_name":"Krenn"},{"full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Tentes, Aris","first_name":"Aris","last_name":"Tentes"}],"publist_id":"3730","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","page":"663 - 680","department":[{"_id":"KrPi"}],"scopus_import":1,"oa":1,"publisher":"Springer","publication_status":"published","conference":{"end_date":"2012-12-06","start_date":"2012-12-02","location":"Beijing, China","name":"ASIACRYPT: Theory and Application of Cryptology and Information Security"},"doi":"10.1007/978-3-642-34961-4_40","_id":"2974","title":"Commitments and efficient zero knowledge proofs from learning parity with noise","month":"12","oa_version":"Submitted Version","type":"conference","citation":{"ista":"Jain A, Krenn S, Pietrzak KZ, Tentes A. 2012. Commitments and efficient zero knowledge proofs from learning parity with noise. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 7658, 663–680.","ama":"Jain A, Krenn S, Pietrzak KZ, Tentes A. Commitments and efficient zero knowledge proofs from learning parity with noise. In: Wang X, Sako K, eds. Vol 7658. Springer; 2012:663-680. doi:10.1007/978-3-642-34961-4_40","chicago":"Jain, Abhishek, Stephan Krenn, Krzysztof Z Pietrzak, and Aris Tentes. “Commitments and Efficient Zero Knowledge Proofs from Learning Parity with Noise.” edited by Xiaoyun Wang and Kazue Sako, 7658:663–80. Springer, 2012. https://doi.org/10.1007/978-3-642-34961-4_40.","ieee":"A. Jain, S. Krenn, K. Z. Pietrzak, and A. Tentes, “Commitments and efficient zero knowledge proofs from learning parity with noise,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China, 2012, vol. 7658, pp. 663–680.","mla":"Jain, Abhishek, et al. Commitments and Efficient Zero Knowledge Proofs from Learning Parity with Noise. Edited by Xiaoyun Wang and Kazue Sako, vol. 7658, Springer, 2012, pp. 663–80, doi:10.1007/978-3-642-34961-4_40.","short":"A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.","apa":"Jain, A., Krenn, S., Pietrzak, K. Z., & Tentes, A. (2012). Commitments and efficient zero knowledge proofs from learning parity with noise. In X. Wang & K. Sako (Eds.) (Vol. 7658, pp. 663–680). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China: Springer. https://doi.org/10.1007/978-3-642-34961-4_40"},"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png"},"date_updated":"2021-01-12T07:40:11Z","intvolume":" 7658","abstract":[{"text":"We construct a perfectly binding string commitment scheme whose security is based on the learning parity with noise (LPN) assumption, or equivalently, the hardness of decoding random linear codes. Our scheme not only allows for a simple and efficient zero-knowledge proof of knowledge for committed values (essentially a Σ-protocol), but also for such proofs showing any kind of relation amongst committed values, i.e. proving that messages m_0,...,m_u, are such that m_0=C(m_1,...,m_u) for any circuit C.\r\n\r\nTo get soundness which is exponentially small in a security parameter t, and when the zero-knowledge property relies on the LPN problem with secrets of length l, our 3 round protocol has communication complexity O(t|C|l log(l)) and computational complexity of O(t|C|l) bit operations. The hidden constants are small, and the computation consists mostly of computing inner products of bit-vectors.","lang":"eng"}],"status":"public","day":"01","acknowledgement":"We are grateful to Petros Mol for helpful discussions on the reduction for the hardness of the xLPN problem.\r\n","ec_funded":1,"project":[{"call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425","name":"Provable Security for Physical Cryptography"}],"pubrep_id":"721","volume":7658,"has_accepted_license":"1"}