Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A verifiable secret shuffle of homomorphic encryptions
Groth J. Journal of Cryptology23 (4):546-579,2010.Type:Article
Date Reviewed: Mar 7 2011

Groth proposes a shuffle-based scheme for an n-move honest verifier zero-knowledge (HVZK) argument, to shuffle known messages. The goal of this shuffle-based HVZK (SHVZK) scheme is to produce efficient HVZK arguments for the correctness of a shuffle. The author follows the Neff paradigm, where the shuffling is based on invariance of polynomials under permutation of their roots.

The author claims that the HVZK argument for correctness of the shuffle is the most efficient in terms of both computation and communication. This claim is proved through a thorough analysis of the overhead associated with the scheme, in section 6, and a subsequent comparison with other schemes, in section 7. The proposed scheme is applicable for multi-exponentiation and for randomized batch verification techniques.

The paper is written in the form of a thorough lead-through from questions such as why such a scheme is needed, to fine details of the scheme, in terms of arguments needed for homomorphic encryptions, and how verifiability is achieved for diverse applications such as mix servers (wherein voting is essential). Groth states that all arguments in the proposed scheme can be turned into HVZK proofs. The tone of the paper leads me to believe that it is intended for readers with a background in cryptography, but the language used makes it very easily accessible to any reader with a background in computing (particularly in network security).

Reviewer:  Zubair Baig Review #: CR138873 (1106-0641)
Bookmark and Share
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy