How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design (Extended Abstract)

Oded Goldreich, Silvio Micali, Avi Wigderson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

100 Scopus citations

Abstract

Under the assumption that encryption functions exist, we show that all languages in NP possess zero-knowledge proofs. That is, it is possible to demonstrate that a CNF formula is satisfiable without revealing any other property of the formula. In particular, without yielding neither a satisfying assignment nor weaker properties such as whether there is a satisfying assignment in which x 1 = TRUE, or whether there is a satisfying assignment in which x 1 = x 3 etc. The above result allows us to prove two fundamental theorems in the field of (two-party and multi-party) cryptographic protocols. These theorems yield automatic and efficient transformations that, given a protocol that is correct with respect to an extremely weak adversary, output a protocol correct in the most adversarial scenario. Thus, these theorems imply powerful methodologies for developing two-party and multi-party cryptographic protocols.

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1986 - Proceedings
EditorsAndrew M. Odlyzko
PublisherSpringer Verlag
Pages171-185
Number of pages15
ISBN (Print)9783540180470
DOIs
StatePublished - 1987
EventAnnual International Cryptology Conference, CRYPTO 1986 - Santa Barbara, United States
Duration: 11 Aug 198615 Aug 1986

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume263 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceAnnual International Cryptology Conference, CRYPTO 1986
Country/TerritoryUnited States
CitySanta Barbara
Period11/08/8615/08/86

Bibliographical note

Publisher Copyright:
© 1987, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design (Extended Abstract)'. Together they form a unique fingerprint.

Cite this