{"editor":[{"last_name":"Micciancio","first_name":"Daniele","full_name":"Micciancio, Daniele"}],"date_published":"2010-02-08T00:00:00Z","oa":1,"year":"2010","status":"public","publisher":"Springer","page":"553 - 571","day":"08","citation":{"chicago":"Bangerter, Endre, Jan Camenisch, and Stephan Krenn. “Efficiency Limitations for Σ-Protocols for Group Homomorphisms.” edited by Daniele Micciancio, 5978:553–71. Springer, 2010. https://doi.org/10.1007/978-3-642-11799-2.","ista":"Bangerter E, Camenisch J, Krenn S. 2010. Efficiency Limitations for Σ-Protocols for Group Homomorphisms. TCC: Theory of Cryptography Conference, LNCS, vol. 5978, 553–571.","apa":"Bangerter, E., Camenisch, J., & Krenn, S. (2010). Efficiency Limitations for Σ-Protocols for Group Homomorphisms. In D. Micciancio (Ed.) (Vol. 5978, pp. 553–571). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-642-11799-2","short":"E. Bangerter, J. Camenisch, S. Krenn, in:, D. Micciancio (Ed.), Springer, 2010, pp. 553–571.","mla":"Bangerter, Endre, et al. Efficiency Limitations for Σ-Protocols for Group Homomorphisms. Edited by Daniele Micciancio, vol. 5978, Springer, 2010, pp. 553–71, doi:10.1007/978-3-642-11799-2.","ama":"Bangerter E, Camenisch J, Krenn S. Efficiency Limitations for Σ-Protocols for Group Homomorphisms. In: Micciancio D, ed. Vol 5978. Springer; 2010:553-571. doi:10.1007/978-3-642-11799-2","ieee":"E. Bangerter, J. Camenisch, and S. Krenn, “Efficiency Limitations for Σ-Protocols for Group Homomorphisms,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 553–571."},"month":"02","date_created":"2018-12-11T12:00:39Z","publication_status":"published","abstract":[{"lang":"eng","text":"Efficient zero-knowledge proofs of knowledge for group homomorphisms are essential for numerous systems in applied cryptography. Especially, Σ-protocols for proving knowledge of discrete logarithms in known and hidden order groups are of prime importance. Yet, while these proofs can be performed very efficiently within groups of known order, for hidden order groups the respective proofs are far less efficient.\n\nThis paper shows strong evidence that this efficiency gap cannot be bridged. Namely, while there are efficient protocols allowing a prover to cheat only with negligibly small probability in the case of known order groups, we provide strong evidence that for hidden order groups this probability is bounded below by 1/2 for all efficient Σ-protocols not using common reference strings or the like.\n\nWe prove our results for a comprehensive class of Σ-protocols in the generic group model, and further strengthen them by investigating certain instantiations in the plain model."}],"main_file_link":[{"url":"http://eprint.iacr.org/2009/595.pdf","open_access":"1"}],"_id":"2978","conference":{"name":"TCC: Theory of Cryptography Conference"},"doi":"10.1007/978-3-642-11799-2","author":[{"first_name":"Endre","full_name":"Bangerter, Endre","last_name":"Bangerter"},{"full_name":"Camenisch, Jan","first_name":"Jan","last_name":"Camenisch"},{"last_name":"Krenn","id":"329FCCF0-F248-11E8-B48F-1D18A9856A87","first_name":"Stephan","full_name":"Stephan Krenn","orcid":"0000-0003-2835-9093"}],"quality_controlled":0,"alternative_title":["LNCS"],"title":"Efficiency Limitations for Σ-Protocols for Group Homomorphisms","intvolume":" 5978","publist_id":"3725","date_updated":"2021-01-12T07:40:12Z","volume":5978,"extern":1,"type":"conference"}