of protocols for smart cards and secure web purchases
but even more so in the context of auctions (due to the
inherent non-interactive nature of the scheme).
ACKNOWLEDGEMENTS
We would like to thank Ioannis Atsonios and the
anonymous referees for valuable comments.
REFERENCES
Bellare, M. and Goldreich, O. (1993). On defining proofs
of knowledge. Lecture Notes in Computer Science,
740:390–420.
Blum, M., Feldman, P., and Micali, S. (1988). Non-
interactive zero-knowledge and its applications. In
STOC ’88: Proceedings of the twentieth annual ACM
symposium on Theory of computing, pages 103–112.
ACM Press.
Boneh, D., Gentry, C., Lynn, B., and Shacham, H. (2003).
Aggregate and verifiably encrypted signatures from
bilinear maps. In Biham, E., editor, EUROCRYPT,
volume 2656 of Lecture Notes in Computer Science,
pages 416–432. Springer.
Boneh, D., Lynn, B., and Shacham, H. (2004). Short signa-
tures from the weil pairing. J. Cryptology, 17(4):297–
319.
Coron, J.-S. and Naccache, D. (2003). Boneh et al.’s k-
element aggregate extraction assumption is equivalent
to the Diffie-Hellman assumption. In Laih, C.-S., ed-
itor, ASIACRYPT, volume 2894 of Lecture Notes in
Computer Science, pages 392–397. Springer.
Crescenzo, G. D., Sakurai, K., and Yung, M. (1997). Zero-
knowledge proofs of decision power: new protocols
and optimal round-complexity. In ICICS ’97: Pro-
ceedings of the First International Conference on In-
formation and Communication Security, pages 17–27,
London, UK. Springer-Verlag.
Crescenzo, G. D., Sakurai, K., and Yung, M. (2000). On
zero-knowledge proofs (extended abstract): “from
membership to decision”. In STOC ’00: Proceed-
ings of the thirty-second annual ACM symposium on
Theory of computing, pages 255–264, New York, NY,
USA. ACM Press.
Dwork, C. and Naor, M. (2000). Zaps and their applica-
tions. In FOCS ’00: Proceedings of the 41st Annual
IEEE Symposium on Foundations of Computer Sci-
ence, pages 283–293, Washington, DC, USA. IEEE
Computer Society.
Feige, U. and Shamir, A. (1990). Witness indistinguishable
and witness hiding protocols. In STOC ’90: Proceed-
ings of the twenty-second annual ACM symposium on
Theory of computing, pages 416–426, New York, NY,
USA. ACM Press.
Goldreich, O. (2001). Foundations of Cryptography I, vol-
ume Basic Tools. Cambridge University Press.
Goldreich, O. and Levin, L. A. (1989). A hard-core pred-
icate for all one-way functions. In STOC ’89: Pro-
ceedings of the twenty-first annual ACM symposium
on Theory of computing, pages 25–32, New York, NY,
USA. ACM Press.
Goldwasser, S., Micali, S., and Rackoff, C. (1989). The
knowledge complexity of interactive proof systems.
SIAM J. Comput., 18(1):186–208.
Groth, J., Ostrovsky, R., and Sahai, A. (2006). Perfect non-
interactive zero knowledge for np. In Vaudenay, S.,
editor, EUROCRYPT, volume 4004 of Lecture Notes
in Computer Science, pages 339–358. Springer.
Rackoff, C. and Simon, D. R. (1992). Non-interactive zero-
knowledge proof of knowledge and chosen ciphertext
attack. In CRYPTO ’91: Proceedings of the 11th
Annual International Cryptology Conference on Ad-
vances in Cryptology, pages 433–444, London, UK.
Springer-Verlag.
Santis, A. D. and Persiano, G. (1992). Zero-knowledge
proofs of knowledge without interaction. In Proceed-
ings of the 33rd Annual Symposium on Foundations of
Computer Science, pages 427–436.
Saxena, A. and Soh, B. (2005). One-way signature chain-
ing: A new paradigm for group cryptosystems. Cryp-
tology ePrint Archive, Report 2005/335.
SECRYPT 2007 - International Conference on Security and Cryptography
244