Review Article | Open Access

Huixin Wu, Feng Wang, "A Survey of Noninteractive Zero Knowledge Proof System and Its Applications", *The Scientific World Journal*, vol. 2014, Article ID 560484, 7 pages, 2014. https://doi.org/10.1155/2014/560484

# A Survey of Noninteractive Zero Knowledge Proof System and Its Applications

**Academic Editor:**Guiwu Wei

#### Abstract

Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

#### 1. Introduction

In 1985, Goldwasser et al. [1] first put forward the concept of interactive proof system and analyzed the interactive proof system whose knowledge complexity is zero, which created an important branch of cryptography and computational complexity theory—zero knowledge proof. The most attractive feature of zero knowledge proof lies in its seemingly contradictory unique nature that a prover can prove the correctness of an assertion to the verifier without leaking any extra information. It can force the malicious participants in cryptographic protocol to execute in accordance with predetermined steps to ensure the safety of the protocol. Thus it has a broad application prospect. To speak vividly, a verifier who receives the zero knowledge proof of a statement is supposed to be told by God that it is true. The main features of zero knowledge proof system include completeness, soundness, and zero knowledge.

*Completeness*. If the statement is correct, then the verifier will “always” accept.

*Soundness*. If the statement is incorrect, then the verifier will “always” reject.

*Zero Knowledge*. No (malicious) verifier can get any extra information from the proof procedure, except the correctness of the statement.

Blum et al. [2, 3] first study the noninteractive zero knowledge (hereinafter referred to as NIZK) proof system and present the common reference string model that is generally applied at present. Noninteractive zero knowledge proof system contains only a message sent by a prover to verifier, which can be better used in the construction of cryptographic protocols. Thereafter, researches on the theory and applications of NIZK proof system have started successively, including NIZK proof of NP problems and noninteractive statistical (perfect) zero knowledge as well as the application of NIZK proof to CCA security encryption scheme, anonymous authentication, and the construction of group and ring signature.

In recent years, Groth et al. suggest to turn the research of NIZK to specific problems [4–17] and construct NIZK proof systems based on different application scenarios. This idea greatly improves the efficiency and practicability of NIZK and created a new line of research on the applications of NIZK. In the subsequent sections of this paper, we will elaborate the relevant concepts of NIZK proof and summarize the main research results of NIZK.

#### 2. Preliminary Knowledge

In the following, let denote the set of -bit strings and let denote the set of all strings. Two probability ensembles are said to be computationally indistinguishable (denoted by ), if no probabilistic polynomial time Turing machine can distinguish them with nonnegligible probability. Two probability ensembles are said to be statistically indistinguishable or statistically close (denoted by ), if their statistical distance is negligible.

##### 2.1. Zero Knowledge Interactive Proof System

*Definition 1 (zero knowledge interactive proof system). *For language and a pair of interactive Turing machines , in which possesses unlimited computational power and is probabilistic polynomial time, is said to be zero knowledge interactive proof system of language if the following three conditions are true.(1)Completeness: for any common input and polynomial ,
(2)Soundness: for any common input and any interactive Turing machine and polynomial ,
(3)Zero knowledge: for each probabilistic polynomial time Turing machine , there is a probabilistic polynomial time algorithm such that, for any ,

is called the prover and is called the verifier.

Intuitively speaking, completeness reflects correctness of the system, which means, for valid input , a prover can always complete the proof successfully such that the verifier accepts. Soundness is defined against the malicious prover, which means, for invalid input , no prover can construct a valid proof system such that the verifier accepts. While for the verifier, zero knowledge means no malicious verifier is able to derive extra knowledge from the process of interaction.

In addition, according to different computational capabilities of the prover and verifier, the above properties (2) and (3) can also be modified, respectively. If the indistinguishability of the two probability ensembles in property (3) is statistically indistinguishable or identically distributed, zero knowledge will be correspondingly defined as statistical zero knowledge and perfect zero knowledge. On the other hand, if soundness holds for any probabilistic polynomial time prover, that is, computational soundness, then the interactive proof system is called the zero knowledge argument system [18].

##### 2.2. Noninteractive Zero Knowledge

Since it has been shown that, in the plain model, only languages in BPP have NIZK proof systems, therefore the definition for NIZK proof system usually contains an initial set-up assumption. At present, it is generally accepted by the researchers to construct NIZK proof system in the common reference string (hereinafter referred to as CRS) model.

*Definition 2 (NIZK proof system). *For a pair of probabilistic Turing machines , in which is probabilistic polynomial time and is deterministic polynomial time, is called the noninteractive zero knowledge proof system for language if the following conditions are met.(1)Completeness: for any common input and polynomial ,
(2)Soundness: for any common input , any interactive Turing machine , and polynomial ,
(3)Zero knowledge: for any , there is a probabilistic polynomial time algorithm such that

##### 2.3. Witness Indistinguishability

*Definition 3 (witness indistinguishability [19]). *Let be an NP language, let be the interactive proof system of , let be the witness relation of , and let be the auxiliary input of . is said to be witness indistinguishable for , if, for any probabilistic polynomial time interactive Turing machine and any , the following probability ensembles are computationally indistinguishable:

Witness indistinguishability is a weaker notion of zero knowledge, but it is sufficient to ensure the security of cryptographic protocol in some applications. It is worth mentioning that witness indistinguishability is closed under concurrent composition.

#### 3. Research Progress of NIZK

##### 3.1. The Definition and Models of NIZK

In view of the important theoretical and applied value of zero knowledge interactive proof system in the fields of computational complexity and cryptography, its inherent nature and characteristics have caused much attention, such as interactivity and the randomness of participants and auxiliary input. Oren [20] first proves that NIZK proof systems only exist for BPP languages in the plain model (without any trusted set-up assumption). In 1988, NIZK proof system based on the CRS model is proposed by Blum et al. [2]. CRS is generated by a trusted party and is accessible to both the prover and verifier. This model requires only the randomness of CRS, not relying on its privacy, so CRS model is more practical than interactive model. In the same year, de Santis et al. [21] discuss NIZK in another model which is called NIZK with preprocessing. The idea of preprocessing model derives from one time pad [22]: in the preprocessing stage, the prover chooses an -bit string and convinces the verifier () through interactive zero knowledge proof; in the subsequent interactive stage, the prover constructs a proof of the statement to the verifier; then the verifier can verify the correctness of the statement according to *.* The disadvantage of preprocessing model is that the prover and verifier need to interact first, and the length of statement proved in the interactive stage is limited by the length of *.* In addition, preprocessing model is stronger than CRS model because the two parties can generate CRS in the preprocessing stage. Comparing the two models, CRS model is more reasonable, general, and practical. It is the widely accepted NIZK model now.

In 2004, Cramer and Damgård [23] proposed a secret key model of NIZK whose security depended not on CRS but assuming an appropriate secret key to exist between the prover and verifier. In 2007, Groth and Ostrovsky [24] put forward multistring NIZK model. They point out that CRS needs to be generated by a trusted third party in the single string model. However, it is difficult to find a suitable third party in practical applications. Therefore, it can be considered that the common reference string is generated by multiple parties as long as most of them are honest. Meanwhile, they also present the first NIZK proof system in the multistring model.

##### 3.2. NIZK Proof Systems of NP Problems

In early literatures, researches on NIZK are mainly focusing on the existence and effective constructions of NIZK proof systems for NP languages.

Blum et al. propose the first bounded NIZK proof system in [2]; that is, for different statements the proof system has to use different CRSs and the length of the statement is controlled by the length of CRS. Later, Blum et al. [3] present a more general NIZK proof system for 3SAT on the basis of [2], which allows a prover to prove many statements with the same CRS. However, the above proof systems are constructed based on specific mathematical problems.

Feige et al. [25] present the first NIZK proof system for NP based on general assumptions, and the construction is based on one-way permutations or certified trapdoor permutations for a polynomial time prover [26]. At the same time, they also introduce a hiding bit model and use witness indistinguishability to turn bounded NIZK into general NIZK proof system which allows many provers to use the same random string to prove different statements. Lapidot and Shamir [27] give the first publicly verifiable NIZK assuming the existence of one-way permutations. References [3, 27] separately show NIZK proofs of 3SAT problem and HC problem based on different assumptions, respectively. Then NIZK proof systems for general NP problem can be obtained by Karp reduction, but this kind of constructions engages a very high level of complexity. Thereafter, Damgård [28] designs NIZK proof system for SAT problem, making the construction of NIZK for NP problem more direct. Simultaneously, he also gives noninteractive statistical zero knowledge argument of HC problem under the preprocessing model.

Bellare and Yung [29] point out that the trapdoor permutation used in NIZK proof system in [25] requires additional verification and puts forward the corresponding solution. Following the hiding bit method in [25], Kilian shows a NIZK proof system for SAT based on one-way permutations, and the number of hiding bits is . Since then, Kilian improves the construction in [30], which reduces the number of hiding bits to . de Santis et al. [31] discuss the length of CRS in NIZK and show a NIZK proof system for NP problem whose CRS length is , in which is constant and is the reasonable error bound. Boyar et al. [32] study short NIZK proofs and construct a NIZK proof system with the length of , in which is the number of gates in the circuit and is the length of the commitment. Moreover, this paper shows a NIZK proof system with length of in the RO model as well, and, in specific applications, NIZK with appropriate length can be obtained by simulating RO.

##### 3.3. NISZK and NIPZK

Statistical zero knowledge [1] plays a significant role in both practical application and theoretical study, because it reflects the inherent characteristics of zero knowledge and does not need to be constructed under cryptographic assumptions as computational zero knowledge. The existing results show that there is computational zero knowledge proof [33] system for any PSPACE language, and, for SZK, we have SZK *⊆* AM *∩* coAM [34, 35]. (Here we use SZK to denote “statistical zero knowledge,” while we use SZK to denote the class of languages which have statistical zero knowledge proof systems. NISZK and similar notions are defined, resp.) However, it is generally believed that NP *⊈* AM *∩* coAM; thus the studies of NISZK are only considered for specific non-NPC language.

Blum et al. [3] propose the first noninteractive perfect zero knowledge (NIPZK) proof system for quadratic nonresidue problem in coNP. Ostrovsky [36] proves that, for any nontrivial language, the existence of SZK and NISZK proof or argument system is a sufficient condition for the existence of one-way functions. Thereafter, de Santis et al. do some further researches on NISZK and NIPZK. First, they give a NIPZK proof for quadratic residue in [37] and a new method that turns noninteractive proofs into interactive proofs which can not only keep the same zero knowledge characteristics but also make the round of the converted interactive proof systems optimal. Then, they discuss the existence of PZK for quadratic nonresidue and the lower bound of CRS in the model with fixed CRS length in [38]. In 1998, de Santis et al. prove that NIZK is closed under complement by constructing a special language called “ID.” Since then, Goldreich et al. [39] study the relationship between SZK and NISZK and prove that NIZK is closed under Karp reductions as well as some other logical operations and ultimately conclude that SZK = NISZK. With the help of Boolean circuit composition theory, de Santis et al. [40] expand the scope of these two languages on the basis of the already known PZK and NIPZK. They point out that the languages got from specific language categories in NC^{1} circuit composition all have NIPZK. Besides, the idea also applies to SZK. Pass et al. [41] discuss NISZK in secret key model together with CRS model. They point out NIZK = NISZK = NIPZK = AM in the secret key model, while, in CRS model for nonadaptive definition, there is NISZK *⊆* AM *∩* coAM and, for adaptive definition, there is NISZK *⊂* BPP/1. Additionally, for the language undecidable by nonuniform polynomial circuits, the necessary and sufficient condition of NIZK is the existence of one-way function. Eventually they show an absolute result for the existence of NIZK: NIZK exists either for simple language only or for all AM languages.

The above results indicate that, for general NP language, noninteractive statistical (perfect) zero knowledge proof does not exist. Then, does noninteractive statistical (perfect) zero knowledge argument exist? Groth et al. [16] give an affirmative answer. They propose the first NIPZK argument system for language SAT and thus prove that there is a NIPZK argument system for any NP language. They also give the first adaptive UC secure NIZK argument. Afterwards, Abe and Fehr [42] put forward the first efficient NIZK argument system with adaptive soundness based on the KEA assumption, which also applies to any NP problem.

##### 3.4. NIZK for Specific Problems

Since its invention, researches on NIZK are mainly focused on the theoretical problems. Although it is once used to construct CCA-2 secure encryption schemes by Naor and Yung [43] and signature schemes by Bellare and Goldwasser [44], these results are just theoretical feasibility without practical applications. One of the important reasons is that the construction of NIZK is not efficient. Early researches are mainly focused on NIZK proof systems for general NP problems, so the NPC problems such as SAT, 3SAT, HC, or G3C are usually taken for consideration. While, in practical applications, we instead consider certain types of problems (such as the computations in the bilinear group), therefore the NIZK proof systems for general NP problems have to be reduced to NIZK proof systems for specific problems, which greatly sacrifices the efficiency. How to construct efficient NIZK proof systems seems to be the key to promote their applications.

In 2008, Groth and Sahai [17] analyze the reasons why the past NIZK proofs are inefficient and put forward the famous GS proof framework that applies to all basic operations in bilinear group. NIZK proof system can be obtained simply and efficiently through instantiating GS proof according to different application backgrounds, which greatly simplifies the design of public key cryptographic algorithm and cryptographic protocol based on bilinear groups. Since then, Ghadafi et al. [45] revise and expand GS proof to make it applicable to more bilinear groups. Later, Groth [7–12] makes further improvements on some aspects such as the computational efficiency and length of NIZK. Besides, Damgård and Thorbek [46] show a NIZK proof system of integer multiplications.

##### 3.5. NIZK and IZK

The relationship, comparison, and transformation between NIZK and IZK are also important research directions of zero knowledge proof systems. At first Blum et al. [2] point out that CRS model is weaker than interactive model; that is, NIZK proof system does not necessarily exist in language with IZK proofs. Then, is there a suitable model making NIZK and IZK equivalent?

In 2002, a new zero knowledge proof model known as the “HELP” model was proposed by Ben-Or and Gutfreund [47], in which a third party “Dealer” is assumed to exist. It is a probabilistic polynomial time algorithm for solving the common reference string. In 2007, Ciocan and Vadhan [48] prove that a language in AM has an interactive proof system only if there is a NIZK proof system in the HELP model. At the same time, they point out that this result applies to the computational and statistical zero knowledge, not relying on cryptographic assumptions. From then on, Chailloux et al. [49] prove that NIZK and IZK are equivalent in the HELP model. In 1990, Fiat and Shamir exhibit a method that transforms interactive protocol into noninteractive protocol, known as “Fiat-Shamir heuristic” in [50]. The method can be used to turn public-coin IZK proofs into NIZK arguments. But hash function is used in this transformation, so the NIZK argument can only be proved to be secure in the RO model. In 1994, de Santis et al. [37] present a new method that turns noninteractive proof systems into interactive proof systems, which can not only keep the same zero knowledge characteristics but also ensure the round complexity of the converted system to be optimal.

##### 3.6. NIZK and Zap

In 2000, Dwork and Naor show a surprising result in [51]: there exists two-round public-coin witness indistinguishable proof system that does not use CRS. The authors call the proof system zap. In a zap, the verifier first sends a random string to the prover; then the prover replies with a message to complete the proof. Zaps have many applications such as the construction of concurrent zero knowledge, deniable authentication [51], and ring signature [52]. The paper also presents a construction of zap using NIZK and verifiable pseudorandom generator (VPRG).

As can be seen from the definition of zap, it has an important link with NIZK. In 2002, de Santis et al. discuss the length of random string in zap and NIZK proof of NP problem. They point out that if there is zap for NP problem, then the length of random string used will be bits; if there is NIZK proof for NP problem, then the number of bits used will also be . In 2006, Groth et al. [15] propose a new method to construct NIZK proof as well as NIZK argument and give the first construction of noninteractive zaps.

#### 4. The Applied Researches of NIZK

The inherent privacy and authentication properties of zero knowledge proof system make it widely used in the construction of cryptographic protocols. Generally speaking, IZK proof system is usually used to construct multiround interactive protocol in the plain model, for example, general two-party and multiparty secure computation, and mostly for designing protocols in an abstract way, while NIZK proof is usually integrated into the construction of specific, practical cryptographic algorithm and cryptographic protocols. This raises very high demands on the construction of efficient NIZK proof systems. At first, Blum et al. point out that NIZK can be used to design public key encryption schemes secure against chosen ciphertext attack. However, this paper only shows the possibility but does not give a specific construction. Since then, Naor and Yung [43] put forward the first CCA secure public key encryption scheme on the basis of probabilistic encryption [53] and NIZK. Bellare and Goldwasser [44] present a new method to construct signature and message authentication protocol with the help of NIZK. And the scheme obtained is secure against adaptive chosen message attack. In 1999, Sahai [54] extends the nonmalleability of cryptographic protocols to NIZK and proposes a method to transform general NIZK into NMNIZK. At the same time, this paper also gives an encryption scheme secure against adaptive chosen ciphertext attack.

On the other hand, NIZK is widely used in group signatures, ring signatures, and electronic voting. NIZK is first used to construct a provably secure group signature scheme in the standard model by Bellare et al. [55]. Thereafter Groth uses NIZK to construct a group signature with constant size as well as a completely anonymous group signature [6] scheme in the standard model. Zap is introduced to the construction of ring signature for the first time by Bender et al. [52]. Recently NIZK is used in shuffle verification by Groth et al. [4, 13, 14].

#### 5. Summaries and Outlook

In the recent 20 years, researches on NIZK proof system and related theory have improved gradually. Recent research focuses are mainly concentrated on the application and efficiency improvement of NIZK proof system, including the following aspects.(1)Efficient NIZK proof and NIZK argument system that apply to specific application backgrounds: currently, the researches for NIZK efficiency are mainly concentrated on the computation in bilinear group, so it is worth deeply studying how to construct highly efficient NIZK protocol applicable to other mathematical backgrounds.(2)Other cryptographic tools that cooperate with the existing proof systems: recently, Abe et al. [56] propose structure-preserving commitments and signatures which apply perfectly to GS proof system so that it enables the modular design of the protocols and at the same time ensures the efficiency. At present, these researches are just beginning, and there are still a lot of problems in the efficiency and application of these schemes.

#### Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

#### References

- S. Goldwasser, S. Micali, and C. Rackoff, “Knowledge complexity of interactive proof systems,”
*SIAM Journal on Computing*, vol. 18, no. 1, pp. 186–208, 1989. View at: Google Scholar - M. Blum, P. Feldman, and S. Micali, “Non-interactive zero-knowledge and its applications,” in
*Proceedings of the 20th Annual ACM symposium on Theory of computing (STOC '88)*, pp. 103–112, ACM, 1988. View at: Google Scholar - M. Blum, A. de Santis, S. Micali, and G. Persiano, “Noninteractive zero-knowledge,”
*SIAM Journal on Computing*, vol. 20, no. 6, pp. 1084–1118, 1991. View at: Google Scholar - S. Bayer, J. Groth, and editors, “Efficient zero knowledge argument for correctness of a shuffle,” in
*Advances in Cryptology—EUROCRYPT 2012*, D. Pointcheval and T. Johansson, Eds., vol. 7237 of*Lecture Notes in Computer Science*, pp. 263–280, Springer, 2012. View at: Publisher Site | Google Scholar - J. Groth, “Simulation-sound NIZK proofs for a practical language and constant size group signatures,” in
*Advances in Cryptology—ASIACRYPT 2006*, X. Lai and K. Chen, Eds., vol. 4284 of*Lecture Notes in Computer Science*, pp. 444–459, Springer, 2006. View at: Publisher Site | Google Scholar - J. Groth, “Fully anonymous group signatures without random oracles,” in
*Advances in Cryptology—ASIACRYPT 2007*, K. Kurosawa, Ed., vol. 4833 of*Lecture Notes in Computer Science*, pp. 164–180, Springer, 2007. View at: Publisher Site | Google Scholar - J. Groth, “Linear algebras with sub-linear zero-knowledge arguments,” in
*Advances in Cryptology—CRYPTO 2009*, S. Halevi, Ed., vol. 5677 of*Lecture Notes in Computer Science*, pp. 192–208, Springer, 2009. View at: Publisher Site | Google Scholar - J. Groth, “Pairing-based non-interactive zero-knowledge proofs,” in
*Pairing-Based Cryptography—Pairing 2010*, M. Joye, A. Miyaji, and A. Otsuka, Eds., vol. 6487 of*Lecture Notes in Computer Science*, p. 206, Springer, 2010. View at: Google Scholar - J. Groth, “Short non-interactive zero-knowledge proofs,” in
*Advances in Cryptology—ASIACRYPT 2010*, M. Abe, Ed., vol. 6477 of*Lecture Notes in Computer Science*, pp. 341–358, Springer, 2010. View at: Publisher Site | Google Scholar - J. Groth, “Short pairing-based non-interactive zero-knowledge arguments,” in
*Advances in Cryptology—ASIACRYPT 2010*, M. Abe, Ed., vol. 6477 of*Lecture Notes in Computer Science*, pp. 321–340, Springer, 2010. View at: Publisher Site | Google Scholar - J. Groth, “Efficient zero-knowledge arguments from two-tiered homomorphic commitments,” in
*Advances in Cryptology—ASIACRYPT 2011*, D. H. Lee and X. Wang, Eds., vol. 7073 of*Lecture Notes in Computer Science*, pp. 431–448, Springer, 2011. View at: Publisher Site | Google Scholar - J. Groth, “Efficient zero-knowledge proofs,” in
*Progress in Cryptology—AFRICACRYPT 2011*, A. Nitaj and D. Pointcheval, Eds., vol. 6737 of*Lecture Notes in Computer Science*, p. 379, Springer, 2011. View at: Publisher Site | Google Scholar - J. Groth and Y. Ishai, “Sub-linear zero-knowledge argument for correctness of a shuffle,” in
*Advances in Cryptology—EUROCRYPT 2008*, N. P. Smart, Ed., vol. 4965 of*Lecture Notes in Computer Science*, pp. 379–396, Springer, 2008. View at: Publisher Site | Google Scholar - J. Groth and S. Lu, “A non-interactive shuffle with pairing based verifiability,” in
*Advances in Cryptology—ASIACRYPT 2007*, K. Kurosawa, Ed., vol. 4833 of*Lecture Notes in Computer Science*, pp. 51–67, Springer, 2007. View at: Publisher Site | Google Scholar - J. Groth, R. Ostrovsky, and A. Sahai, “Non-interactive Zaps and new techniques for NIZK,” in
*Advances in Cryptology—CRYPTO 2006*, C. Dwork, Ed., vol. 4117 of*Lecture Notes in Computer Science*, pp. 97–111, Springer, 2006. View at: Publisher Site | Google Scholar - J. Groth, R. Ostrovsky, and A. Sahai, “Perfect non-interactive zero knowledge for NP,” in
*Advances in Cryptology—EUROCRYPT 2006*, S. Vaudenay, Ed., vol. 4004 of*Lecture Notes in Computer Science*, pp. 339–358, Springer, 2006. View at: Publisher Site | Google Scholar - J. Groth and A. Sahai, “Efficient non-interactive proof systems for bilinear groups,” in
*Advances in Cryptology—EUROCRYPT 2008*, N. P. Smart, Ed., vol. 4965 of*Lecture Notes in Computer Science*, pp. 415–432, Springer, 2008. View at: Publisher Site | Google Scholar - G. Brassard, D. Chaum, and C. Crépeau, “Minimum disclosure proofs of knowledge,”
*Journal of Computer and System Sciences*, vol. 37, no. 2, pp. 156–189, 1988. View at: Google Scholar - U. Feige and A. Shamir, “Witness indistinguishable and witness hiding protocols,” in
*Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC '90)*, pp. 416–426, ACM, May 1990. View at: Google Scholar - Y. Oren, “On the cunning power of cheating verifiers: some observations about zero-knowledge proofs,” in
*Proceedings of the 28th Annual Symposium on Foundations of Computer Science (SFCS '87)*, pp. 462–471, IEEE, 1987. View at: Publisher Site | Google Scholar - A. de Santis, S. Micali, and G. Persiano, “Noninteractive zero-knowledge with preprocessing,” in
*Advances in Cryptology—CRYPTO '88*, S. Goldwasser, Ed., vol. 403 of*Lecture Notes in Computer Science*, pp. 269–282, Springer, 1990. View at: Publisher Site | Google Scholar - C. E. Shannon, “Communication theory of secrecy systems,”
*The Bell System Technical Journal*, vol. 28, pp. 656–715, 1949. View at: Publisher Site | Google Scholar - R. Cramer and I. Damgård, “Secret-key zero knowledge and non-interactive verifiable exponentiation,” in
*Theory of Cryptography*, M. Naor, Ed., vol. 2951 of*Lecture Notes in Computer Science*, pp. 223–237, Springer, 2004. View at: Publisher Site | Google Scholar - J. Groth and R. Ostrovsky, “Cryptography in the multi-string model,” in
*Advances in Cryptology—CRYPTO 2007*, A. Menezes, Ed., vol. 4622 of*Lecture Notes in Computer Science*, pp. 323–341, Springer, 2007. View at: Publisher Site | Google Scholar - U. Feige, D. Lapidot, and A. Shamir, “Multiple non-interactive zero knowledge proofs random string,” in
*Proceedings of the 31st Annual Symposium on Foundations of Computer Science (SFCS '90)*, vol. 1, pp. 308–317, 1990. View at: Publisher Site | Google Scholar - M. Bellare and M. Yung, “Certifying cryptographic tools: the case of trapdoor permu-tations,” in
*Advances in Cryptology—CRYPTO '92*, E. F. Brickell, Ed., vol. 740 of*Lecture Notes in Computer Science*, pp. 442–460, Springer, 1992. View at: Publisher Site | Google Scholar - D. Lapidot and A. Shamir, “Publicly verifiable non-interactive zero-knowledge proofs,” in
*Advances in Cryptology—CRYPT0 '90*, A. Menezes and S. A. Vanstone, Eds., vol. 537 of*Lecture Notes in Computer Science*, pp. 353–365, Springer, 1990. View at: Publisher Site | Google Scholar - I. Damgård, “Non-interactive circuit based proofs and non-interactive perfect zero-knowledge with proprocessing,” in
*Advances in Cryptology—EUROCRYPT '92*, R. A. Rueppel, Ed., vol. 658 of*Lecture Notes in Computer Science*, pp. 341–355, Springer, 1993. View at: Publisher Site | Google Scholar - M. Bellare and M. Yung, “Certifying permutations: noninteractive zero-knowledge based on any trapdoor permutation,”
*Journal of Cryptology*, vol. 9, no. 3, pp. 149–166, 1996. View at: Google Scholar - J. Kilian, “On the complexity of bounded-interaction and noninteractive zero-knowledge proofs,” in
*Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS '94)*, pp. 466–477, IEEE, 1994. View at: Publisher Site | Google Scholar - A. de Santis, G. di Crescenzo, and G. Persiano, “Non-interactive zero-knowledge: a low-randomness characterization of NP,” in
*Automata, Languages and Programming*, J. Wiedermann, P. van Emde Boas, and M. Nielsen, Eds., vol. 1644 of*Lecture Notes in Computer Science*, pp. 271–280, Springer, 1999. View at: Google Scholar - J. Boyar, I. Damgård, and R. Peralta, “Short non-interactive cryptographie proofs,”
*Journal of Cryptology*, vol. 13, no. 4, pp. 449–472, 2000. View at: Publisher Site | Google Scholar - R. Impagfiazzo and M. Yung, “Direct minimum-knowledge computations,” in
*Advances in Cryptology—CRYPTO '87*, C. Pomerance, Ed., vol. 293 of*Lecture Notes in Computer Science*, pp. 40–51, Springer, 1987. View at: Publisher Site | Google Scholar - W. Aiello, “Statistical zero-knowledge languages can be recognized in two rounds,”
*Journal of Computer and System Sciences*, vol. 42, no. 3, pp. 327–345, 1991. View at: Publisher Site | Google Scholar - L. Fortnow, “The complexity of perfect zero-knowledge,” in
*Proceedings of the 19th annual ACM symposium on Theory of computing (STOC '87)*, pp. 204–209, ACM, 1987. View at: Publisher Site | Google Scholar - R. Ostrovsky, “One-way functions, hard on average problems, and statistical zero-knowledge proofs,” in
*Proceedings of the 6th Annual Structure in Complexity Theory Conference*, pp. 133–138, July 1991. View at: Google Scholar - A. de Santis, G. di Crescenzo, and G. Persiano, “The knowledge complexity of quadratic residuosity languages,”
*Theoretical Computer Science*, vol. 132, no. 1-2, pp. 291–317, 1994. View at: Google Scholar - A. de Santis, G. di Crescenzo, and G. Persiano, “Randomness-efficient non-interactive zero-knowledge,” in
*Automata, Languages and Programming*, P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, Eds., vol. 1256 of*Lecture Notes in Computer Science*, pp. 716–726, Springer, 1997. View at: Publisher Site | Google Scholar - O. Goldreich, A. Sahai, and S. P. Vadhan, “Can statistical zero knowledge be made non-interactive? Or on the relationship of SZK and NISZK,” in
*Advances in Cryptology—CRYPTO '99*, M. J. Wiener, Ed., vol. 1666 of*Lecture Notes in Computer Science*, pp. 467–484, Springer, 1999. View at: Publisher Site | Google Scholar - A. de Santis, G. di Crescenzo, and G. Persiano, “On NC
^{1}boolean circuit composition of non-interactive perfect zero-knowledge,” in*Mathematical Foundations of Computer Science 2004*, J. Fiala, V. Koubek, and J. Kratochvil, Eds., vol. 3153 of*Lecture Notes in Computer Science*, pp. 356–367, Springer, 2004. View at: Publisher Site | Google Scholar - R. Pass and A. Shelat, “Unconditional characterizations of non-interactive zero knowledge,” in
*Advances in Cryptology—CRYPTO 2005*, V. Shoup, Ed., vol. 3621 of*Lecture Notes in Computer Science*, pp. 118–134, Springer, 2005. View at: Publisher Site | Google Scholar - M. Abe and S. Fehr, “Perfect NIZK with adaptive soundness,” in
*Theory of Cryptography*, S. P. Vadhan, Ed., vol. 4392 of*Lecture Notes in Computer Science*, pp. 118–136, Springer, 2007. View at: Publisher Site | Google Scholar - M. Naor and M. Yung, “Public-key cryptosystems provably secure against chosen ciphertext attacks,” in
*Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC '90)*, pp. 427–437, ACM, May 1990. View at: Google Scholar - M. Bellare and S. Goldwasser, “New paradigms for digital signatures and mes-sage authentication based on non-interative zero knowledge proofs,” in
*Advances in Cryptology—CRYPTO '89 Proceedings*, G. Brassard, Ed., vol. 435 of*Lecture Notes in Computer Science*, pp. 194–211, Springer, 1989. View at: Publisher Site | Google Scholar - E. Ghadafi, N. P. Smart, and B. Warinschi, “Groth-Sahai proofs revisited,” in
*Public Key Cryptography—PKC 2010*, P. Q. Nguyen and D. Pointcheval, Eds., vol. 6056 of*Lecture Notes in Computer Science*, pp. 177–192, Springer, 2010. View at: Publisher Site | Google Scholar - I. Damgård and R. Thorbek, “Non-interactive proofs for integer multiplication,” in
*Advances in Cryptology—EUROCRYPT 2007*, M. Naor, Ed., vol. 4515 of*Lecture Notes in Computer Science*, pp. 412–429, Springer, 2007. View at: Publisher Site | Google Scholar - M. Ben-Or and D. Gutfreund, “Trading help for interaction in statistical zero-knowledge proofs,”
*Journal of Cryptology*, vol. 16, no. 2, pp. 95–116, 2003. View at: Publisher Site | Google Scholar - D. F. Ciocan and S. Vadhan, “Interactive and noninteractive zero in the help model,”
*Cryptology ePrint Archive*Report 2007/389, 2007, http://eprint.iacr.org. View at: Google Scholar - A. Chailloux, D. F. Ciocan, I. Kerenidis, and S. Vadhan, “Interactive and noninteractive zero knowledge are equivalent in the help model,” in
*Theory of Cryptography*, R. Canetti, Ed., vol. 4948 of*Lecture Notes in Computer Science*, pp. 501–534, Springer, 2008. View at: Publisher Site | Google Scholar - A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in
*Advances in Cryptology—CRYPTO '86*, A. M. Odlyzko, Ed., vol. 263 of*Lecture Notes in Computer Science*, pp. 186–194, Springer, 1987. View at: Publisher Site | Google Scholar - C. Dwork and M. Naor, “Zaps and their applications,” in
*Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS '00)*, pp. 283–293, November 2000. View at: Google Scholar - A. Bender, J. Katz, and R. Morselli, “Ring signatures: stronger definitions, and constructions without random oracles,”
*Journal of Cryptology*, vol. 22, no. 1, pp. 114–138, 2009. View at: Publisher Site | Google Scholar - S. Goldwasser and S. Micali, “Probabilistic encryption,”
*Journal of Computer and System Sciences*, vol. 28, no. 2, pp. 270–299, 1984. View at: Google Scholar - A. Sahai, “Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security,” in
*Proceedings of the 40th IEEE Annual Conference on Foundations of Computer Science (FOCS '99)*, pp. 543–553, October 1999. View at: Google Scholar - M. Bellare, D. Micciancio, and B. Warinschi, “Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions,” in
*Advances in Cryptology—EUROCRYPT 2003*, E. Biham, Ed., vol. 2656 of*Lecture Notes in Computer Science*, pp. 614–629, Springer, 2003. View at: Publisher Site | Google Scholar - M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, “Structure-preserving signatures and commitments to group elements,” in
*Advances in Cryptology—CRYPTO 2010*, T. Rabin, Ed., vol. 6223 of*Lecture Notes in Computer Science*, pp. 209–236, Springer, 2010. View at: Publisher Site | Google Scholar

#### Copyright

Copyright © 2014 Huixin Wu and Feng Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.