1993-09-19 - Re: Definition of “Zero Knowledge”

Header Data

From: doug@netcom.com (Doug Merritt)
To: cypherpunks@toad.com
Message Hash: d224f97003b53efe9c164c30116918ee78bd34cc7b420b72fb2e9cfa77e7d539
Message ID: <9309191615.AA18299@netcom4.netcom.com>
Reply To: N/A
UTC Datetime: 1993-09-19 16:16:50 UTC
Raw Date: Sun, 19 Sep 93 09:16:50 PDT

Raw message

From: doug@netcom.com (Doug Merritt)
Date: Sun, 19 Sep 93 09:16:50 PDT
To: cypherpunks@toad.com
Subject: Re: Definition of "Zero Knowledge"
Message-ID: <9309191615.AA18299@netcom4.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


From: khijol!erc@apple.com (Ed Carp)
>Thanks for the definition (but I knew that, anyway).  Sorru I wasn't clear -
>what I was looking for was examples of how zero-knowledge proof techniques
>could make source code impenetrable.

An arbitrary algorithm can be translated into a zero proof theory model
that is intractable to functionally analyze. Its operations on inputs and
outputs can take place within the realm of the intractable model, with
the inputs and outputs being transformed from the encoding of the outside
realm into an encoding useful to the realm of the model. The inputs and
outputs are the queries and answers of zero proof theory.

With such a thing, knowing every detail of the registers and instructions
being executed at all times still wouldn't tell you what you really
wanted to know.

I'm unsure whether this has been published, let alone implemented; I just
thought it was an obvious corollary back when ZPT itself was first published.
It might have been discussed in the literature at the time, but if so,
I've forgotten.

I'm also not claiming this is necessarily a useful approach in practice,
because the obvious ways of implementing such a thing would be more than
a little slow. I suspect that it could be done efficiently with a little
algorithmic cleverness, but I don't have evidence of that this instant.

I'm currently designing something with very much the same flavor, but
with somewhat different goals, and computational expense of the operators
in the model is precisely the difficulty with that, too, so far.
	Doug
--
Doug Merritt				doug@netcom.com
Professional Wild-eyed Visionary	Member, Crusaders for a Better Tomorrow

Unicode Novis Cypherpunks Gutenberg Wavelets Conlang Logli Alife HC_III
Computational linguistics Fundamental physics Cogsci SF GA VR CASE TLAs





Thread