Paper 2020/928

Multi-theorem (Malicious) Designated-Verifier NIZK for QMA

Omri Shmueli

Abstract

We present the first non-interactive zero-knowledge argument system for QMA with multi-theorem security. Our protocol setup constitutes an additional improvement and is constructed in the malicious designated-verifier (MDV-NIZK) model (Quach, Rothblum, and Wichs, EUROCRYPT 2019), where the setup consists of a trusted part that includes only a common uniformly random string and an untrusted part of classical public and secret verification keys, which even if sampled maliciously by the verifier, the zero knowledge property still holds. The security of our protocol is established under the Learning with Errors Assumption. Our main technical contribution is showing a general transformation that compiles any sigma protocol into a reusable MDV-NIZK protocol, using NIZK for NP. Our technique is classical but works for quantum protocols and allows the construction of a reusable MDV-NIZK for QMA.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
quantum cryptographyzero knowledge
Contact author(s)
omrishmueli @ mail tau ac il
History
2020-07-26: received
Short URL
https://ia.cr/2020/928
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/928,
      author = {Omri Shmueli},
      title = {Multi-theorem (Malicious) Designated-Verifier NIZK for QMA},
      howpublished = {Cryptology ePrint Archive, Paper 2020/928},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/928}},
      url = {https://eprint.iacr.org/2020/928}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.