Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge

Cody Freitag*, Ilan Komargodski, Rafael Pass

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a “best-possible security” against non-uniform polynomial-time attackers. In particular, no polynomial-time attacker with s bits of non-uniform advice can find significantly more than s accepting proofs for false statements. Our first result is a construction of non-uniformly sound certificates for all (Formula Presented) in the random oracle model, where the attacker’s advice can depend arbitrarily on the random oracle. We next show that the existence of non-uniformly sound certificates for (Formula Presented) (and collision resistant hash functions) yields a public-coin constant-round fully concurrent zero-knowledge argument for (Formula Presented).

Original languageAmerican English
Title of host publicationAdvances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings
EditorsDaniele Micciancio, Alexandra Boldyreva
PublisherSpringer Verlag
Number of pages30
ISBN (Print)9783030269531
StatePublished - 2019
Externally publishedYes
Event39th Annual International Cryptology Conference, CRYPTO 2019 - Santa Barbara, United States
Duration: 18 Aug 201922 Aug 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11694 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference39th Annual International Cryptology Conference, CRYPTO 2019
Country/TerritoryUnited States
CitySanta Barbara

Bibliographical note

Publisher Copyright:
© 2019, International Association for Cryptologic Research.


Dive into the research topics of 'Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge'. Together they form a unique fingerprint.

Cite this