Non-Interactive Zero-Knowledge Proofs of Non-Membership [chapter]

Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015 Lecture Notes in Computer Science  
Often, in privacy-sensitive cryptographic protocols, a party commits to a secret message m and later needs to prove that m belongs to a language L or that m does not belong to L (but does not want to reveal any further information). We present a method to prove in a non-interactive way that a committed value does not belong to a given language L. Our construction is generic and relies on the corresponding proof of membership to L. We present an efficient realization of our proof system by
more » ... ing smooth projective hash functions and Groth-Sahai proof system. In 2009, Kiayias and Zhou introduced zero-knowledge proofs with witness elimination which enable to prove that a committed message m belongs to a set L in such a way that the verifier accepts the interaction only if m does not belong to a set determined by a public relation Q and some private input m of the verifier. We show that the protocol they proposed is flawed and that a dishonest prover can actually make a verifier accept a proof for any message m ∈ L even if (m, m ) ∈ Q. Using our non-interactive proof of non-membership of committed values, we are able to fix their protocol and improve its efficiency. Our approach finds also efficient applications in other settings, e.g. in anonymous credential systems and privacy-preserving authenticated identification and key exchange protocols.
doi:10.1007/978-3-319-16715-2_8 fatcat:ccypmrgasrekxffeii6c6desgi