In cryptography we typically share a secret which allows us to decrypt future messages. Commonly this is a password that I make up and submit to a Web site, then later produce to verify I am the same person.
I missed Kazue Sako’s Zero Knowledge Proofs 101 presentation at IIW last week, but Rachel Myers shared an impressively simply retelling in the car on the way back to San Francisco, which inspired me to read the notes and review the proof for myself. I’ve attempted to reproduce this simple explanation below, also noting additional sources and related articles.
Zero Knowledge Proofs (ZPKs) are very useful when applied to internet identity — with an interactive exchange you can prove you know a secret without actually revealing the secret.
Understanding Zero Knowledge Proofs with simple math:
x -> f(x)
Simple one way function. Easy to go one way from x
to f(x)
but mathematically hard to go from f(x)
to x.
The most common example is a hash function. Wired: What is Password Hashing? provides an accessible introduction to why hash functions are important to cryptographic applications today.
f(x) = g ^ x mod p
Known(public): g
, p
* g
is a constant
* p
has to be prime
Easy to know x
and compute g ^ x mod p
but difficult to do in reverse.
Interactive Proof
Alice wants to prove Bob that she knows x
without giving any information about x
. Bob already knows f(x)
. Alice can make f(x)
public and then prove that she knows x
through an interactive exchange with anyone on the Internet, in this case, Bob.
- Alice publishes f(x):
g^x mod p
- Alice picks random number
r
- Alice sends Bob
u
= g^r mod p - Now Bob has artifact based on that random number, but can’t actually calculate the random number
- Bob returns a challenge
e
. Either 0 or 1 - Alice responds with
v
:
If 0,v = r
If 1,v = r + x
- Bob can now calculate:
If e == 0: Bob has the random numberr
, as well as the publicly known variables and can check ifu == g^v mod p
If e == 1:u*f(x) = g^v (mod p)
I believe step 6 is true based on Congruence of Powers, though I’m not sure that I’ve transcribed e==1 case accurately with my limited ascii representation.
If r
is true random, equally distributed between zero and (p-1)
, this does not leak any information about x
, which is pretty neat, yet not sufficient.
In order to ensure that Alice cannot be impersonated, multiple iterations are required along with the use of large numbers (see IIW session notes).
Further Reading
- Comparing Information Without Leaking It Ronald Fagin, Moni Naor, Peter Winkler, 1996.
- The Knowledge Complexity of Interactive Proof-Systems: original 1985 paper by Shafi Goldwasser, Silvio Micali, and Charles Rackoff
- How to Explain Zero-Knowledge Protocols to Your Children Quisquater, Jean-Jacques; Guillou, Louis C.; Berson, Thomas A. (1990). Advances in Cryptology – CRYPTO ’89: Proceedings. 435: 628–631.
- Applied Kid Cryptography or How To Convince Your Children You Are Not Cheating Moni Naor, Yael Naor, Omer Reingold, 1999