Azuma's inequality: Difference between revisions
en>Zandr4 anchor for link |
|||
Line 1: | Line 1: | ||
In [[cryptography]], a '''zero-knowledge proof''' or '''zero-knowledge protocol''' is a method by which one party (the ''prover'') can prove to another party (the ''verifier'') that a given statement is true, without conveying any additional information apart from the fact that the statement is indeed true. For cases where the ability to prove the statement requires some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the statement to anyone else. Notice that the notion only applies if the statement being proven is the fact that the prover has such knowledge (otherwise, the statement would not be proved in zero-knowledge, since at the end of the protocol the verifier would gain the additional information that the prover has knowledge of the required secret information). This is a particular case known as ''zero-knowledge proof of knowledge'', and it nicely illustrates the essence of the notion of zero-knowledge proofs: proving that one possesses a certain knowledge is in most cases trivial if one is allowed to simply reveal that knowledge; the challenge is proving that one has such knowledge without revealing it or without revealing anything else. | |||
For | For zero-knowledge proofs of knowledge, the protocol must necessarily require interactive input from the verifier, usually in the form of a challenge or challenges such that the responses from the prover will convince the verifier if and only if the statement is true (i.e., if the prover does have the claimed knowledge). This is clearly the case, since otherwise the verifier could record the execution of the protocol and replay it to someone else: if this were accepted by the new party as proof that the replaying party knows the secret information, then the new party's acceptance is either justified - the replayer 'does' know the secret information - which means that the protocol leaks knowledge and is not zero-knowledge, or it is spurious - i.e. leads to a party accepting someone's proof of knowledge who does not actually possess it. | ||
Some forms of non-interactive zero-knowledge proofs of knowledge exist,<ref name="noninteractive">{{cite paper |first=Manuel |last=Blum |first2=Paul |last2=Feldman |first3=Silvio |last3=Micali |title=Non-Interactive Zero-Knowledge and Its Applications |work=Proceedings of the twentieth annual ACM symposium on Theory of computing (STOC 1988) |pages=103–112 |year=1988 |doi=10.1145/62212.62222 }}</ref> but the validity of the proof relies on computational assumptions (typically the assumptions of an ideal [[cryptographic hash function]]). | |||
== Abstract example == | |||
{{multiple image | |||
| align = right | |||
| direction = vertical | |||
| header = | |||
| width = 150 | |||
| image1 = Zkip alibaba1.png | |||
| caption1 = Peggy randomly takes either path A or B, while Victor waits outside | |||
| image2 = Zkip alibaba2.png | |||
| caption2 = Victor chooses an exit path | |||
| image3 = Zkip alibaba3.png | |||
| caption3 = Peggy reliably appears at the exit Victor names | |||
}} | |||
There is a well-known story presenting the fundamental ideas of zero-knowledge proofs, first published by [[Jean-Jacques Quisquater]] and others in their paper "How to Explain Zero-Knowledge Protocols to Your Children".<ref>{{cite paper |first=Jean-Jacques |last=Quisquater |first2=Louis C. |last2=Guillou |first3=Thomas A. |last3=Berson |title=How to Explain Zero-Knowledge Protocols to Your Children |work=Advances in Cryptology - CRYPTO '89: Proceedings |volume=435 |issue= |pages=628–631 |year=1990 |url=http://www.cs.wisc.edu/~mkowalcz/628.pdf }}</ref> It is [[Alice and Bob|common practice]] to label the two [[characters in cryptography|parties]] in a zero-knowledge proof as Peggy (the prover of the statement) and Victor (the verifier of the statement). | |||
In this story, Peggy has uncovered the secret word used to open a magic door in a cave. The cave is shaped like a circle, with the entrance on one side and the magic door blocking the opposite side. Victor wants to know whether Peggy knows the secret word; but Peggy, being a very private person, does not want to reveal the fact of her knowledge to the world in general. | |||
They label the left and right paths from the entrance A and B. First, Victor waits outside the cave as Peggy goes in. Peggy takes either path A or B; Victor is not allowed to see which path she takes. Then, Victor enters the cave and shouts the name of the path he wants her to use to return, either A or B, chosen at random. Providing she really does know the magic word, this is easy: she opens the door, if necessary, and returns along the desired path. | |||
However, suppose she did not know the word. Then, she would only be able to return by the named path if Victor were to give the name of the same path that she had entered by. Since Victor would choose A or B at random, she would have a 50% chance of guessing correctly. If they were to repeat this trick many times, say 20 times in a row, her chance of successfully anticipating all of Victor's requests would become vanishingly small (about one in 1.05 million). | |||
Thus, if Peggy repeatedly appears at the exit Victor names, he can conclude that it is very probable — astronomically probable — that Peggy does in fact know the secret word. | |||
However, even if Victor is wearing a hidden camera that records the whole transaction, the only thing the camera will record is Victor shouting "A!" and Peggy appearing at A; Victor shouting "B!" and Peggy appearing at B. A recording of this type would be trivial for any two people to fake (requiring only that Peggy and Victor agree beforehand on the sequence of A's and B's that Victor will shout). Such a recording will certainly never be convincing to anyone but the original participants. In fact, even a person who was present as an observer ''at the original experiment'' would be unconvinced, since Victor and Peggy might have orchestrated the whole "experiment" from start to finish. | |||
Notice that if Victor chooses his A's and B's by flipping a coin on-camera, this protocol loses its zero-knowledge property; the on-camera coin flip would probably be convincing to any person watching the recording later. However, digital cryptography generally "flips coins" by relying on a [[pseudo-random number generator]], which is akin to a coin with a fixed pattern of heads and tails known only to the coin's owner. If Victor's coin behaved this way, then again it would be possible for Victor and Peggy to have faked the "experiment". | |||
== Definition == | |||
A zero-knowledge proof must satisfy three properties: | |||
# '''Completeness''': if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover. | |||
# '''Soundness''': if the statement is false, no cheating prover can convince the honest verifier that it is true, except with some small probability. | |||
# '''Zero-knowledge''': if the statement is true, no cheating verifier learns anything other than this fact. This is formalized by showing that every cheating verifier has some ''simulator'' that, given only the statement to be proven (and no access to the prover), can produce a transcript that "looks like" an interaction between the honest prover and the cheating verifier. | |||
The first two of these are properties of more general [[interactive proof system]]s. The third is what makes the proof zero-knowledge. | |||
Zero-knowledge proofs are not proofs in the mathematical sense of the term because there is some small probability, the ''soundness error'', that a cheating prover will be able to convince the verifier of a false statement. In other words, they are probabilistic rather than deterministic. However, there are techniques to decrease the soundness error to negligibly small values. | |||
A formal definition of zero-knowledge has to use some computational model, the most common one being that of a [[Turing machine]]. Let <math>P</math>,<math>V</math>, and <math>S</math> be turing machines. An [[interactive proof system]] with <math>(P,V)</math> for | |||
a language <math>L</math> is zero-knowledge if for any probabilistic polynomial time (PPT) verifier <math>\hat V</math> there exists an expected PPT simulator <math>S</math> such that <br> | |||
<math>\forall x \in L, z \in \{0, 1\}^{*}, \text{View}_{\hat V} [P(x) \leftrightarrow \hat V(x, z)] = S(x, z)</math> | |||
The prover <math>P</math> is modeled as having unlimited computation power (in practice, P usually is a [[Probabilistic Turing machine]]). Intuitively, the definition states that an interactive proof system <math>(P,V)</math> is zero- | |||
knowledge if for any verifier <math>\hat V</math> there exists an efficient simulator <math>S</math> that can | |||
reproduce the conversation between <math>P</math> and <math>\hat V</math> | |||
on any given input. | |||
The auxiliary string <math>z</math> in the definition plays the role of “prior knowledge”. The definition implies that <math>\hat V</math> cannot use any | |||
prior knowledge string <math>z</math> to mine information out of its conversation with <math>P</math> because we | |||
demand that if <math>S</math> is also given this prior knowledge then it can reproduce the conversation | |||
between <math>\hat V</math> and <math>P</math> just as before. | |||
The definition given is that of perfect zero-knowledge. Computational zero-knowledge is obtained by requiring that the views of the verifier <math>\hat V</math> and the simulator are only [[Computational indistinguishability|computationally indistinguishable]], given the auxiliary string. | |||
== Practical examples == | |||
=== Discrete Log of a given value === | |||
We can extend these ideas to a more realistic cryptography application. Peggy wants to prove to Victor that she knows the [[discrete logarithm|discrete log]] of a given value in a given [[group theory|group]].<ref>{{cite paper |first=David |last=Chaum |first2=Jan-Hendrik |last2=Evertse |first3=Jeroen |last3=van de Graaf |title=An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations |work=Advances in Cryptology - EuroCrypt '87: Proceedings |volume=304 |issue= |pages=127–141 |year=1987 }}</ref> For example, given a value <math>y</math>, a large [[Prime number|prime]] <math>p</math> and a generator <math>g</math>, she wants to prove that she knows a value <math>x</math> such that <math>g^x ~\bmod~ p = y</math>, without revealing <math>x</math>. This could be used as a proof of identity, in that Peggy could have such knowledge because she chose a random value <math>x</math> that she didn't reveal to anyone, computed <math>y = g^x ~\bmod~ p</math> and distributed the value of <math>y</math> to all potential verifiers, such that at a later time, proving knowledge of <math>x</math> is equivalent to proving identity as Peggy. | |||
The protocol proceeds as follows: in each round, Peggy generates a random number <math>r</math>, computes <math>C = g^r ~\bmod~ p</math> and discloses this to Victor. After receiving <math>C</math>, Victor randomly issues one of the following two requests: he either requests that Peggy discloses the value of <math>r</math>, or the value of <math>x+r ~\bmod~ (p-1)</math>. With either answer, Peggy is only disclosing a random value, so no information is disclosed by a correct execution of one round of the protocol. | |||
Victor can verify either answer; if he requested <math>r</math>, he can then compute <math>g^r ~\bmod~ p</math> and verify that it matches <math>C</math>. If he requested <math>x+r ~\bmod~ (p-1)</math>, he can verify that <math>C</math> is consistent with this, by computing <math>g^{x+r ~\bmod~ (p-1)} ~\bmod~ p</math> and verifying that it matches <math>C \cdot y ~\bmod~ p</math>. If Peggy indeed knows the value of <math>x</math>, she can respond to either one of Victor's possible challenges. | |||
If Peggy knew or could guess which challenge Victor is going to issue, then she could easily cheat and convince Victor that she knows <math>x</math> when she does not: if she knows that Victor is going to request <math>r</math>, then she proceeds normally: she picks <math>r</math>, computes <math>C = g^r ~\bmod~ p</math> and discloses <math>C</math> to Victor; she will be able to respond to Victor's challenge. On the other hand, if she knows that Victor will request <math>x+r ~\bmod~ (p-1)</math>, then she picks a random value <math>r'</math>, computes <math>C' = g^{r'} \cdot {(g^x)}^{-1} ~\bmod~ p</math>, and disclose <math>C'</math> to Victor as the value of <math>C</math> that he is expecting. When Victor challenges her to reveal <math>x+r ~\bmod~ (p-1)</math>, she reveals <math>r'</math>, for which Victor will verify consistency, since he will in turn compute <math>g^{r'} ~\bmod~ p</math>, which matches <math>C' \cdot y</math>, since Peggy multiplied by the inverse of <math>y</math>. | |||
However, if in either one of the above scenarios Victor issues a challenge other than the one she was expecting and for which she manufactured the result, then she will be unable to respond to the challenge under the assumption of infeasibility of solving the discrete log for this group. If she picked <math>r</math> and disclosed <math>C = g^r ~\bmod~ p</math>, then she will be unable to produce a valid <math>x+r ~\bmod~ (p-1)</math> that would pass Victor's verification, given that she does not know <math>x</math>. And if she picked a value <math>r'</math> that poses as <math>x+r ~\bmod~ (p-1)</math>, then she would have to respond with the discrete log of the value that she disclosed — a value that she obtained through arithmetic with known values, and not by computing a power with a known exponent. | |||
Thus, a cheating prover has a 0.5 probability of successfully cheating in one round. By executing a large enough number of rounds, the probability of a cheating prover succeeding can be made arbitrarily low. | |||
=== Hamiltonian cycle for a large graph === | |||
In this scenario, Peggy knows a [[Hamiltonian path|Hamiltonian cycle]] for a large [[Graph (mathematics)|graph]], ''G''. Victor knows ''G'' but not the cycle (e.g., Peggy has generated ''G'' and revealed it to him.) Finding a Hamiltonian cycle given a large graph is believed to be infeasible, since its corresponding decision version is known to be [[NP-complete]]. Peggy will prove that she knows the cycle without simply revealing it (perhaps Victor is interested in buying it but wants verification first, or maybe Peggy is the only one who knows this information and is proving her identity to Victor). | |||
To show that Peggy knows this Hamiltonian cycle, she and Victor play several rounds of a game. | |||
* At the beginning of each round, Peggy creates ''H'', an [[graph isomorphism|isomorphic graph]] to ''G'' (i.e. ''H'' is just like ''G'' except that all the vertices have different names). Since it is trivial to translate a Hamiltonian cycle between isomorphic graphs with known isomorphism, if Peggy knows a Hamiltonian cycle for ''G'' she also must know one for ''H''. | |||
* Peggy commits to ''H''. She could do so by using a cryptographic [[commitment scheme]]. Alternatively, she could number the vertices of ''H'', then for each edge of ''H'' write a small piece of paper containing the two vertices of the edge and then put these pieces of paper upside down on a table. The purpose of this commitment is that Peggy is not able to change ''H'' while at the same time Victor has no information about ''H''. | |||
*Victor then randomly chooses one of two questions to ask Peggy. He can either ask her to show the isomorphism between ''H'' and ''G'' (see [[graph isomorphism problem]]), or he can ask her to show a Hamiltonian cycle in ''H''. | |||
*If Peggy is asked to show that the two graphs are isomorphic, she first uncovers all of ''H'' (e.g. by turning all pieces of papers that she put on the table) and then provides the vertex translations that map ''G'' to ''H''. Victor can verify that they are indeed isomorphic. | |||
*If Peggy is asked to prove that she knows a Hamiltonian cycle in ''H'', she translates her Hamiltonian cycle in ''G'' onto ''H'' and only uncovers the edges on the Hamiltonian cycle. This is enough for Victor to check that ''H'' does indeed contain a Hamiltonian cycle. | |||
;Completeness: | |||
If Peggy is honest, she can easily satisfy Victor's demand for either a graph isomorphism (which she has) or a Hamiltonian cycle (which she can construct by applying the isomorphism to the cycle in ''G''). | |||
;Zero-Knowledge: | |||
Peggy's answers do not reveal the original Hamiltonian cycle in ''G''. Each round, Victor will learn only ''H'''s isomorphism to ''G'' or a Hamiltonian cycle in ''H''. He would need both answers for a single ''H'' to discover the cycle in ''G'', so the information remains unknown as long as Peggy can generate a distinct ''H'' every round. If Peggy does not know of a Hamiltonian Cycle in ''G'', but somehow knew in advance what Victor would ask to see each round then she could cheat. For example, if Peggy knew ahead of time that Victor would ask to see the Hamiltonian Cycle in ''H'' then she could generate a Hamiltonian cycle for an unrelated graph. Similarly, if Peggy knew in advance that Victor would ask to see the isomorphism then she could simply generate an isomorphic graph ''H'' (in which she also does not know a Hamiltonian Cycle). Victor could simulate the protocol by himself (without Peggy) because he knows what he will ask to see. Therefore, Victor gains no information about the Hamiltonian cycle in ''G'' from the information revealed in each round. | |||
;Soundness: | |||
If Peggy does not know the information, she can guess which question Victor will ask and generate either a graph isomorphic to ''G'' or a Hamiltonian cycle for an unrelated graph, but since she does not know a Hamiltonian cycle for ''G'' she cannot do both. With this guesswork, her chance of fooling Victor is 2<sup >−<var >n</var ></sup >, where <var >n</var > is the number of rounds. For all realistic purposes, it is infeasibly difficult to defeat a zero knowledge proof with a reasonable number of rounds in this way. | |||
==Variants of zero-knowledge== | |||
Different variants of zero-knowledge can be defined by formalizing the intuitive concept of what is meant by the output of the simulator "looking like" the execution of the real proof protocol in the following ways: | |||
* We speak of ''perfect zero-knowledge'' if the distributions produced by the simulator and the proof protocol are distributed exactly the same. This is for instance the case in the first example above. | |||
* ''Statistical zero-knowledge''<ref>Sahai, Amit, and Salil Vadhan. 2003. A complete problem for statistical zero knowledge. Journal of the Association for Computing Machinery 50, no. 2: 196-249</ref> means that the distributions are not necessarily exactly the same, but they are [[statistically close]], meaning that their statistical difference is a [[negligible function]]. | |||
* We speak of ''computational zero-knowledge'' if no efficient algorithm can distinguish the two distributions. | |||
== Applications == | |||
Research in zero-knowledge proofs has been motivated by [[authentication]] systems where one party wants to prove its identity to a second party via some secret information (such as a password) but doesn't want the second party to learn anything about this secret. This is called a "zero-knowledge [[proof of knowledge]]". However, a password is typically too small or insufficiently random to be used in many schemes for zero-knowledge proofs of knowledge. A [[zero-knowledge password proof]] is a special kind of zero-knowledge proof of knowledge that addresses the limited size of passwords. | |||
One of the most fascinating uses of zero-knowledge proofs within cryptographic protocols is to enforce honest behavior while maintaining privacy. Roughly, the idea is to force a user to prove, using a zero-knowledge proof, that its behavior is correct according to the protocol. Because of soundness, we know that the user must really act honestly in order to be able to provide a valid proof. Because of zero knowledge, we know that the user does not compromise the privacy of its secrets in the process of providing the proof. This application of zero-knowledge proofs was first used in the ground-breaking paper of [[Oded Goldreich]], [[Silvio Micali]], and [[Avi Wigderson]] on [[secure multiparty computation]]. | |||
==History and results== | |||
Zero-knowledge proofs were first conceived in 1985 by [[Shafi Goldwasser]], [[Silvio Micali]], and [[Charles Rackoff]] in their paper "The Knowledge Complexity of Interactive Proof-Systems".<ref>{{Citation | last1=Goldwasser | first1=S. | last2=Micali | first2=S. | last3=Rackoff | first3=C. | title=The knowledge complexity of interactive proof systems | url=http://crypto.cs.mcgill.ca/~crepeau/COMP647/2007/TOPIC02/GMR89.pdf | doi = 10.1137/0218012 | publisher=[[Society for Industrial and Applied Mathematics]] | location=Philadelphia | year=1989 | journal=SIAM Journal on Computing | issn=1095-7111 | volume=18 | issue=1 | pages=186–208}}</ref> This paper introduced the '''IP''' hierarchy of interactive proof systems (''see [[interactive proof system]]'') and conceived the concept of ''knowledge complexity'', a measurement of the amount of knowledge about the proof transferred from the prover to the verifier. They also gave the first zero-knowledge proof for a concrete problem, that of deciding [[quadratic residue|quadratic nonresidues]] mod ''m''. Together with a paper by [[László Babai]] and [[Shlomo Moran]], this landmark paper invented interactive proof systems, for which all five authors won the first [[Gödel Prize]] in 1993. | |||
In their own words, Goldwasser, Micali, and Rackoff say: | |||
<blockquote> | |||
Of particular interest is the case where this additional knowledge is essentially 0 and we show that [it] is possible to interactively prove that a number is quadratic non residue mod ''m'' releasing 0 additional knowledge. This is surprising as no efficient algorithm for deciding quadratic residuosity mod ''m'' is known when ''m''’s factorization is not given. Moreover, all known ''NP'' proofs for this problem exhibit the prime factorization of ''m''. This indicates that adding interaction to the proving process, may decrease the amount of knowledge that must be communicated in order to prove a theorem. | |||
</blockquote> | |||
The quadratic nonresidue problem has both an '''[[NP (complexity)|NP]]''' and a '''[[co-NP]]''' algorithm, and so lies in the intersection of '''NP''' and '''co-NP'''. This was also true of several other problems for which zero-knowledge proofs were subsequently discovered, such as an unpublished proof system by Oded Goldreich verifying that a two-prime modulus is not a [[Blum integer]].<ref>{{cite paper |first=Oded |last=Goldreich |title=A zero-knowledge proof that a two-prime moduli is not a Blum integer |work=Unpublished manuscript |year=1985 }}</ref> | |||
[[Oded Goldreich]], [[Silvio Micali]], and [[Avi Wigderson]] took this one step further, showing that, assuming the existence of unbreakable encryption, one can create a zero-knowledge proof system for the NP-complete [[graph coloring problem]] with three colors. Since every problem in '''NP''' can be efficiently reduced to this problem, this means that, under this assumption, all problems in '''NP''' have zero-knowledge proofs.<ref>{{cite journal |first=Oded |last=Goldreich |first2=Silvio |last2=Micali |first3=Avi |last3=Wigderson |title=Proofs that yield nothing but their validity |journal=Journal of the ACM |volume=38 |issue=3 |pages=690–728 |doi=10.1145/116825.116852 |year=1991 }}</ref> The reason for the assumption is that, as in the above example, their protocols require encryption. A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of [[one-way function]]s, but it is conceivable that some physical means might also achieve it. | |||
On top of this, they also showed that the [[graph nonisomorphism problem]], the [[complement (complexity)|complement]] of the [[graph isomorphism problem]], has a zero-knowledge proof. This problem is in '''co-NP''', but is not currently known to be in either '''NP''' or any practical class. More generally, Goldreich, Goldwasser et al. would go on to show that, also assuming unbreakable encryption, there are zero-knowledge proofs for ''all'' problems in '''IP'''='''PSPACE''', or in other words, anything that can be proved by an interactive proof system can be proved with zero knowledge.<ref>{{cite book |first=Michael |last=Ben-Or |first2=Oded |last2=Goldreich |first3=Shafi |last3=Goldwasser |first4=Johan |last4=Hastad |first5=Joe |last5=Kilian |first6=Silvio |last6=Micali |first7=Phillip |last7=Rogaway |chapter=Everything provable is provable in zero-knowledge |editor-first=S. |editor-last=Goldwasser |title=Advances in Cryptology--CRYPTO '88 |volume=403 |series=Lecture Notes in Computer Science |pages=37–56 |publisher=Springer-Verlag |year=1990 }}</ref> | |||
Not liking to make unnecessary assumptions, many theorists sought a way to eliminate the necessity of [[one way function]]s. One way this was done was with ''multi-prover interactive proof systems'' (see [[interactive proof system]]), which have multiple independent provers instead of only one, allowing the verifier to "cross-examine" the provers in isolation to avoid being misled. It can be shown that, without any intractability assumptions, all languages in '''NP''' have zero-knowledge proofs in such a system.<ref>{{cite paper |first=M. |last=Ben-or |first2=Shafi |last2=Goldwasser |first3=J. |last3=Kilian |first4=A. |last4=Wigderson |url=http://theory.lcs.mit.edu/~cis/pubs/shafi/1988-stoc-bgkw.pdf |title=Multi prover interactive proofs: How to remove intractability assumptions |work=Proceedings of the 20th ACM Symposium on Theory of Computing |pages=113–121 |year=1988 }}</ref> | |||
It turns out that in an Internet-like setting, where multiple protocols may be executed concurrently, building zero-knowledge proofs is more challenging. The line of research investigating concurrent zero-knowledge proofs was initiated by the work of [[Cynthia Dwork|Dwork]], [[Moni Naor|Naor]], and Sahai.<ref>{{cite journal |first=Cynthia |last=Dwork |first2=Moni |last2=Naor |first3=Amit |last3=Sahai |title=Concurrent Zero Knowledge |journal=Journal of the ACM |volume=51 |issue=6 |pages=851–898 |year=2004 |doi=10.1145/1039488.1039489 }}</ref> One particular development along these lines has been the development of [[witness-indistinguishable proof]] protocols. The property of witness-indistinguishability is related to that of zero-knowledge, yet witness-indistinguishable protocols do not suffer from the same problems of concurrent execution.<ref>{{cite paper |first=Uriel |last=Feige |first2=Adi |last2=Shamir |title=Witness Indistinguishable and Witness Hiding Protocols |work=Proceedings of the twenty-second annual ACM Symposium on Theory of Computing (STOC) |year=1990 |doi=10.1145/100216.100272 }}</ref> | |||
Another variant of zero-knowledge proofs are [[non-interactive zero-knowledge proof]]s. Blum, Feldman, and Micali showed that a common random string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction.<ref name="noninteractive" /> | |||
==See also== | |||
{{portal|cryptography}} | |||
* [[Arrow information paradox]] | |||
* [[Cryptographic protocol]] | |||
* [[Feige–Fiat–Shamir identification scheme]] | |||
* [[Proof of knowledge]] | |||
* [[Topics in cryptography]] | |||
* [[Witness-indistinguishable proof]] | |||
* [[Zerocoin]] | |||
* [[Zero-knowledge password proof]] | |||
==Notes== | |||
{{Reflist}} | |||
==External links== | |||
* [http://www.wisdom.weizmann.ac.il/~naor/PUZZLES/waldo.html Applied Kid Cryptography] – A simple explanation of zero-knowledge proofs using [[Where's Waldo?]] as an example | |||
* [http://www.austinmohr.com/work/files/zkp.pdf A gentle introduction to zero-knowledge proofs with applications to cryptography] | |||
* [http://www.wisdom.weizmann.ac.il/~oded/gmw1.html How to construct zero-knowledge proof systems for NP] | |||
* [http://www.cs.ucsd.edu/users/daniele/papers/GMR.html An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products] | |||
* [http://www.wisdom.weizmann.ac.il/~oded/zk-tut02.html A tutorial by Oded Goldreich on zero knowledge proofs] | |||
* [[Salil Vadhan]], [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.70.4056&rep=rep1&type=pdf Vadhan's phd thesis on statistical zero knowledge] | |||
* Theory of Computing Course, Cornell University 2009, [http://www.cs.cornell.edu/courses/cs6810/2009sp/scribe/lecture18.pdf Zero knowledge proofs] | |||
[[Category:Cryptographic protocols]] | |||
[[Category:Theory of cryptography]] | |||
[[Category:Zero-knowledge protocols]] | |||
{{Crypto}} |
Revision as of 06:22, 11 November 2013
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any additional information apart from the fact that the statement is indeed true. For cases where the ability to prove the statement requires some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the statement to anyone else. Notice that the notion only applies if the statement being proven is the fact that the prover has such knowledge (otherwise, the statement would not be proved in zero-knowledge, since at the end of the protocol the verifier would gain the additional information that the prover has knowledge of the required secret information). This is a particular case known as zero-knowledge proof of knowledge, and it nicely illustrates the essence of the notion of zero-knowledge proofs: proving that one possesses a certain knowledge is in most cases trivial if one is allowed to simply reveal that knowledge; the challenge is proving that one has such knowledge without revealing it or without revealing anything else.
For zero-knowledge proofs of knowledge, the protocol must necessarily require interactive input from the verifier, usually in the form of a challenge or challenges such that the responses from the prover will convince the verifier if and only if the statement is true (i.e., if the prover does have the claimed knowledge). This is clearly the case, since otherwise the verifier could record the execution of the protocol and replay it to someone else: if this were accepted by the new party as proof that the replaying party knows the secret information, then the new party's acceptance is either justified - the replayer 'does' know the secret information - which means that the protocol leaks knowledge and is not zero-knowledge, or it is spurious - i.e. leads to a party accepting someone's proof of knowledge who does not actually possess it.
Some forms of non-interactive zero-knowledge proofs of knowledge exist,[1] but the validity of the proof relies on computational assumptions (typically the assumptions of an ideal cryptographic hash function).
Abstract example
People are nonetheless rushing to buy properties in Singapore. A new residential condominium mission in Bedok had a long queue three days before its official launch and bought more than 350 units on the very first day. Nonetheless, there is a ‘development' that had emerged in 2011 that the majority have possibly overlooked.
In August, more than a hundred individuals across 16 states reportedly had been sickened with salmonella after consuming mangos In September, the Meals and Drug Administration detained mango imports from a Mexican packing house after the fruits had been linked to the sickenings Save Cash On Your Online Purchasing Make saving money when purchasing on-line a breeze with Bodge's favourite app, Invisible Hands. This helpful program does the price-checking analysis for you, and will warn you when a unique site has a better value - or let you realize that you have found the most effective deal. Watch Posted by Edison Foo September 29, 2013 HEARTH SALE!!! From only $9xx,000! We hope this listing will help launch your search for new properties in Singapore. It's unlawful to purchase ice cream after 6 pm, in Newark.
for a borrower with one or more excellent residential property loans3; and No SSD will be payable by the seller if the property is bought more than three years after it was bought. Non-extension of the Jan 2009 Funds assistance measures for the property market when the measures expire. Permitting up to 2 years of property tax deferral for land accepted for improvement. Lively secondary marketplace for easy exit of property investments. Curiosity on mortgage fee is tax deductible when the property is rented out. We've progressive property tax rates for residential properties- the higher the value of the residential property, the upper the tax charge. Why do I've to pay property tax on my house when I'm an onwer-occupier and not deriving rental earnings? Palacio Cluster Landed
After obtaining a Sale License (topic to authorities circumstances meant to guard individuals shopping for property in Singapore), he might www.rmmonline.com proceed to sell units in his growth. Funding in the property market of Singapore is likely one of the few investment choices the place utilizing the bank's cash could not be any easier. The power of expats, to make a down payment, leverage the capital and consequently improve total return on investment, is excessive in Singapore. PRs who own a HDB flat must sell their flat inside six months of buying a non-public residential property in Singapore. EVERLASTING residents (PRs) now face unprecedented limits on their skill to purchase property in Singapore. New Condo in 2013 March Foreigners are eligible for Singapore greenback mortgage loan. housing grant
Skilled property brokers in Singapore will assist the client and defend their interests throughout the acquisition, and will help safe the provide at the best possible price. The agents may even be sure that all paperwork are in order and that the vendor is the rightful proprietor of the property. Most of the property brokers share their databases with each other. Tuesday's measures come after the Monetary Authority of Singapore in June tightened rules on property loans, and closed loopholes that allowed some householders to circumvent loan restrictions and avoid paying levies when buying extra property. Contact us for a FREE housing loan analysis and to study concerning the newest mortgage to worth on Singapore housing loans. J Gateway Condominium (Bought Out) Oct, 2013
6. Completion of automotive park, roads and drains serving the housing project 5% 7. Notice of Vacant Possession (Upon obtaining Temporary Occupation Permit) The estimates given by SingaporeHousingLoan.SG's calculator are not quotations and are usually not binding in any way on SingaporeHousingLoan.sg or the consumer. The method of calculation does not exactly mirror that of which is being used by the individual monetary establishment and the data provided should be used as a information only. SingaporeHousingLoan.SG's calculator does not pre-qualify you for any housing loan from any monetary institution. Undercover Report Finds Unlawful Rat Meat Sold In London Market Unpasteurized Tempeh Linked To Salmonella Outbreak That Sickens 60 Hottest EC Launch in Sengkang!
BuyRentSingaporeProperty.com is dedicated in providing the newest residential launches, Developer's sales, new launches, resale, HIGH tasks and rental of properties in Singapore. Then there are new launch property condos in the mid-tier range. These are sometimes in the vicinity of the city fringe, in areas corresponding to Newton and Novena Tanjong Rhu. These new launch projects are popular due to their proximity to town heart, the place the enterprise and entertainment centers and all the amenities they provide, but they're usually cheaper than the City core region tasks. Why submit cheques to register for new property launches in Singapore? Riversails Apartment @ Higher Serangoon LakeVille @ Jurong Lakeside Condo by MCL Ferra Condo @ Leonie Hill
There is a well-known story presenting the fundamental ideas of zero-knowledge proofs, first published by Jean-Jacques Quisquater and others in their paper "How to Explain Zero-Knowledge Protocols to Your Children".[2] It is common practice to label the two parties in a zero-knowledge proof as Peggy (the prover of the statement) and Victor (the verifier of the statement).
In this story, Peggy has uncovered the secret word used to open a magic door in a cave. The cave is shaped like a circle, with the entrance on one side and the magic door blocking the opposite side. Victor wants to know whether Peggy knows the secret word; but Peggy, being a very private person, does not want to reveal the fact of her knowledge to the world in general.
They label the left and right paths from the entrance A and B. First, Victor waits outside the cave as Peggy goes in. Peggy takes either path A or B; Victor is not allowed to see which path she takes. Then, Victor enters the cave and shouts the name of the path he wants her to use to return, either A or B, chosen at random. Providing she really does know the magic word, this is easy: she opens the door, if necessary, and returns along the desired path.
However, suppose she did not know the word. Then, she would only be able to return by the named path if Victor were to give the name of the same path that she had entered by. Since Victor would choose A or B at random, she would have a 50% chance of guessing correctly. If they were to repeat this trick many times, say 20 times in a row, her chance of successfully anticipating all of Victor's requests would become vanishingly small (about one in 1.05 million).
Thus, if Peggy repeatedly appears at the exit Victor names, he can conclude that it is very probable — astronomically probable — that Peggy does in fact know the secret word.
However, even if Victor is wearing a hidden camera that records the whole transaction, the only thing the camera will record is Victor shouting "A!" and Peggy appearing at A; Victor shouting "B!" and Peggy appearing at B. A recording of this type would be trivial for any two people to fake (requiring only that Peggy and Victor agree beforehand on the sequence of A's and B's that Victor will shout). Such a recording will certainly never be convincing to anyone but the original participants. In fact, even a person who was present as an observer at the original experiment would be unconvinced, since Victor and Peggy might have orchestrated the whole "experiment" from start to finish.
Notice that if Victor chooses his A's and B's by flipping a coin on-camera, this protocol loses its zero-knowledge property; the on-camera coin flip would probably be convincing to any person watching the recording later. However, digital cryptography generally "flips coins" by relying on a pseudo-random number generator, which is akin to a coin with a fixed pattern of heads and tails known only to the coin's owner. If Victor's coin behaved this way, then again it would be possible for Victor and Peggy to have faked the "experiment".
Definition
A zero-knowledge proof must satisfy three properties:
- Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover.
- Soundness: if the statement is false, no cheating prover can convince the honest verifier that it is true, except with some small probability.
- Zero-knowledge: if the statement is true, no cheating verifier learns anything other than this fact. This is formalized by showing that every cheating verifier has some simulator that, given only the statement to be proven (and no access to the prover), can produce a transcript that "looks like" an interaction between the honest prover and the cheating verifier.
The first two of these are properties of more general interactive proof systems. The third is what makes the proof zero-knowledge.
Zero-knowledge proofs are not proofs in the mathematical sense of the term because there is some small probability, the soundness error, that a cheating prover will be able to convince the verifier of a false statement. In other words, they are probabilistic rather than deterministic. However, there are techniques to decrease the soundness error to negligibly small values.
A formal definition of zero-knowledge has to use some computational model, the most common one being that of a Turing machine. Let ,, and be turing machines. An interactive proof system with for
a language is zero-knowledge if for any probabilistic polynomial time (PPT) verifier there exists an expected PPT simulator such that
The prover is modeled as having unlimited computation power (in practice, P usually is a Probabilistic Turing machine). Intuitively, the definition states that an interactive proof system is zero- knowledge if for any verifier there exists an efficient simulator that can reproduce the conversation between and on any given input. The auxiliary string in the definition plays the role of “prior knowledge”. The definition implies that cannot use any prior knowledge string to mine information out of its conversation with because we demand that if is also given this prior knowledge then it can reproduce the conversation between and just as before.
The definition given is that of perfect zero-knowledge. Computational zero-knowledge is obtained by requiring that the views of the verifier and the simulator are only computationally indistinguishable, given the auxiliary string.
Practical examples
Discrete Log of a given value
We can extend these ideas to a more realistic cryptography application. Peggy wants to prove to Victor that she knows the discrete log of a given value in a given group.[3] For example, given a value , a large prime and a generator , she wants to prove that she knows a value such that , without revealing . This could be used as a proof of identity, in that Peggy could have such knowledge because she chose a random value that she didn't reveal to anyone, computed and distributed the value of to all potential verifiers, such that at a later time, proving knowledge of is equivalent to proving identity as Peggy.
The protocol proceeds as follows: in each round, Peggy generates a random number , computes and discloses this to Victor. After receiving , Victor randomly issues one of the following two requests: he either requests that Peggy discloses the value of , or the value of . With either answer, Peggy is only disclosing a random value, so no information is disclosed by a correct execution of one round of the protocol.
Victor can verify either answer; if he requested , he can then compute and verify that it matches . If he requested , he can verify that is consistent with this, by computing and verifying that it matches . If Peggy indeed knows the value of , she can respond to either one of Victor's possible challenges.
If Peggy knew or could guess which challenge Victor is going to issue, then she could easily cheat and convince Victor that she knows when she does not: if she knows that Victor is going to request , then she proceeds normally: she picks , computes and discloses to Victor; she will be able to respond to Victor's challenge. On the other hand, if she knows that Victor will request , then she picks a random value , computes , and disclose to Victor as the value of that he is expecting. When Victor challenges her to reveal , she reveals , for which Victor will verify consistency, since he will in turn compute , which matches , since Peggy multiplied by the inverse of .
However, if in either one of the above scenarios Victor issues a challenge other than the one she was expecting and for which she manufactured the result, then she will be unable to respond to the challenge under the assumption of infeasibility of solving the discrete log for this group. If she picked and disclosed , then she will be unable to produce a valid that would pass Victor's verification, given that she does not know . And if she picked a value that poses as , then she would have to respond with the discrete log of the value that she disclosed — a value that she obtained through arithmetic with known values, and not by computing a power with a known exponent.
Thus, a cheating prover has a 0.5 probability of successfully cheating in one round. By executing a large enough number of rounds, the probability of a cheating prover succeeding can be made arbitrarily low.
Hamiltonian cycle for a large graph
In this scenario, Peggy knows a Hamiltonian cycle for a large graph, G. Victor knows G but not the cycle (e.g., Peggy has generated G and revealed it to him.) Finding a Hamiltonian cycle given a large graph is believed to be infeasible, since its corresponding decision version is known to be NP-complete. Peggy will prove that she knows the cycle without simply revealing it (perhaps Victor is interested in buying it but wants verification first, or maybe Peggy is the only one who knows this information and is proving her identity to Victor).
To show that Peggy knows this Hamiltonian cycle, she and Victor play several rounds of a game.
- At the beginning of each round, Peggy creates H, an isomorphic graph to G (i.e. H is just like G except that all the vertices have different names). Since it is trivial to translate a Hamiltonian cycle between isomorphic graphs with known isomorphism, if Peggy knows a Hamiltonian cycle for G she also must know one for H.
- Peggy commits to H. She could do so by using a cryptographic commitment scheme. Alternatively, she could number the vertices of H, then for each edge of H write a small piece of paper containing the two vertices of the edge and then put these pieces of paper upside down on a table. The purpose of this commitment is that Peggy is not able to change H while at the same time Victor has no information about H.
- Victor then randomly chooses one of two questions to ask Peggy. He can either ask her to show the isomorphism between H and G (see graph isomorphism problem), or he can ask her to show a Hamiltonian cycle in H.
- If Peggy is asked to show that the two graphs are isomorphic, she first uncovers all of H (e.g. by turning all pieces of papers that she put on the table) and then provides the vertex translations that map G to H. Victor can verify that they are indeed isomorphic.
- If Peggy is asked to prove that she knows a Hamiltonian cycle in H, she translates her Hamiltonian cycle in G onto H and only uncovers the edges on the Hamiltonian cycle. This is enough for Victor to check that H does indeed contain a Hamiltonian cycle.
- Completeness
If Peggy is honest, she can easily satisfy Victor's demand for either a graph isomorphism (which she has) or a Hamiltonian cycle (which she can construct by applying the isomorphism to the cycle in G).
- Zero-Knowledge
Peggy's answers do not reveal the original Hamiltonian cycle in G. Each round, Victor will learn only H's isomorphism to G or a Hamiltonian cycle in H. He would need both answers for a single H to discover the cycle in G, so the information remains unknown as long as Peggy can generate a distinct H every round. If Peggy does not know of a Hamiltonian Cycle in G, but somehow knew in advance what Victor would ask to see each round then she could cheat. For example, if Peggy knew ahead of time that Victor would ask to see the Hamiltonian Cycle in H then she could generate a Hamiltonian cycle for an unrelated graph. Similarly, if Peggy knew in advance that Victor would ask to see the isomorphism then she could simply generate an isomorphic graph H (in which she also does not know a Hamiltonian Cycle). Victor could simulate the protocol by himself (without Peggy) because he knows what he will ask to see. Therefore, Victor gains no information about the Hamiltonian cycle in G from the information revealed in each round.
- Soundness
If Peggy does not know the information, she can guess which question Victor will ask and generate either a graph isomorphic to G or a Hamiltonian cycle for an unrelated graph, but since she does not know a Hamiltonian cycle for G she cannot do both. With this guesswork, her chance of fooling Victor is 2−n, where n is the number of rounds. For all realistic purposes, it is infeasibly difficult to defeat a zero knowledge proof with a reasonable number of rounds in this way.
Variants of zero-knowledge
Different variants of zero-knowledge can be defined by formalizing the intuitive concept of what is meant by the output of the simulator "looking like" the execution of the real proof protocol in the following ways:
- We speak of perfect zero-knowledge if the distributions produced by the simulator and the proof protocol are distributed exactly the same. This is for instance the case in the first example above.
- Statistical zero-knowledge[4] means that the distributions are not necessarily exactly the same, but they are statistically close, meaning that their statistical difference is a negligible function.
- We speak of computational zero-knowledge if no efficient algorithm can distinguish the two distributions.
Applications
Research in zero-knowledge proofs has been motivated by authentication systems where one party wants to prove its identity to a second party via some secret information (such as a password) but doesn't want the second party to learn anything about this secret. This is called a "zero-knowledge proof of knowledge". However, a password is typically too small or insufficiently random to be used in many schemes for zero-knowledge proofs of knowledge. A zero-knowledge password proof is a special kind of zero-knowledge proof of knowledge that addresses the limited size of passwords.
One of the most fascinating uses of zero-knowledge proofs within cryptographic protocols is to enforce honest behavior while maintaining privacy. Roughly, the idea is to force a user to prove, using a zero-knowledge proof, that its behavior is correct according to the protocol. Because of soundness, we know that the user must really act honestly in order to be able to provide a valid proof. Because of zero knowledge, we know that the user does not compromise the privacy of its secrets in the process of providing the proof. This application of zero-knowledge proofs was first used in the ground-breaking paper of Oded Goldreich, Silvio Micali, and Avi Wigderson on secure multiparty computation.
History and results
Zero-knowledge proofs were first conceived in 1985 by Shafi Goldwasser, Silvio Micali, and Charles Rackoff in their paper "The Knowledge Complexity of Interactive Proof-Systems".[5] This paper introduced the IP hierarchy of interactive proof systems (see interactive proof system) and conceived the concept of knowledge complexity, a measurement of the amount of knowledge about the proof transferred from the prover to the verifier. They also gave the first zero-knowledge proof for a concrete problem, that of deciding quadratic nonresidues mod m. Together with a paper by László Babai and Shlomo Moran, this landmark paper invented interactive proof systems, for which all five authors won the first Gödel Prize in 1993.
In their own words, Goldwasser, Micali, and Rackoff say:
Of particular interest is the case where this additional knowledge is essentially 0 and we show that [it] is possible to interactively prove that a number is quadratic non residue mod m releasing 0 additional knowledge. This is surprising as no efficient algorithm for deciding quadratic residuosity mod m is known when m’s factorization is not given. Moreover, all known NP proofs for this problem exhibit the prime factorization of m. This indicates that adding interaction to the proving process, may decrease the amount of knowledge that must be communicated in order to prove a theorem.
The quadratic nonresidue problem has both an NP and a co-NP algorithm, and so lies in the intersection of NP and co-NP. This was also true of several other problems for which zero-knowledge proofs were subsequently discovered, such as an unpublished proof system by Oded Goldreich verifying that a two-prime modulus is not a Blum integer.[6]
Oded Goldreich, Silvio Micali, and Avi Wigderson took this one step further, showing that, assuming the existence of unbreakable encryption, one can create a zero-knowledge proof system for the NP-complete graph coloring problem with three colors. Since every problem in NP can be efficiently reduced to this problem, this means that, under this assumption, all problems in NP have zero-knowledge proofs.[7] The reason for the assumption is that, as in the above example, their protocols require encryption. A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of one-way functions, but it is conceivable that some physical means might also achieve it.
On top of this, they also showed that the graph nonisomorphism problem, the complement of the graph isomorphism problem, has a zero-knowledge proof. This problem is in co-NP, but is not currently known to be in either NP or any practical class. More generally, Goldreich, Goldwasser et al. would go on to show that, also assuming unbreakable encryption, there are zero-knowledge proofs for all problems in IP=PSPACE, or in other words, anything that can be proved by an interactive proof system can be proved with zero knowledge.[8]
Not liking to make unnecessary assumptions, many theorists sought a way to eliminate the necessity of one way functions. One way this was done was with multi-prover interactive proof systems (see interactive proof system), which have multiple independent provers instead of only one, allowing the verifier to "cross-examine" the provers in isolation to avoid being misled. It can be shown that, without any intractability assumptions, all languages in NP have zero-knowledge proofs in such a system.[9]
It turns out that in an Internet-like setting, where multiple protocols may be executed concurrently, building zero-knowledge proofs is more challenging. The line of research investigating concurrent zero-knowledge proofs was initiated by the work of Dwork, Naor, and Sahai.[10] One particular development along these lines has been the development of witness-indistinguishable proof protocols. The property of witness-indistinguishability is related to that of zero-knowledge, yet witness-indistinguishable protocols do not suffer from the same problems of concurrent execution.[11]
Another variant of zero-knowledge proofs are non-interactive zero-knowledge proofs. Blum, Feldman, and Micali showed that a common random string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction.[1]
See also
Sportspersons Hyslop from Nicolet, usually spends time with pastimes for example martial arts, property developers condominium in singapore singapore and hot rods. Maintains a trip site and has lots to write about after touring Gulf of Porto: Calanche of Piana.
- Arrow information paradox
- Cryptographic protocol
- Feige–Fiat–Shamir identification scheme
- Proof of knowledge
- Topics in cryptography
- Witness-indistinguishable proof
- Zerocoin
- Zero-knowledge password proof
Notes
43 year old Petroleum Engineer Harry from Deep River, usually spends time with hobbies and interests like renting movies, property developers in singapore new condominium and vehicle racing. Constantly enjoys going to destinations like Camino Real de Tierra Adentro.
External links
- Applied Kid Cryptography – A simple explanation of zero-knowledge proofs using Where's Waldo? as an example
- A gentle introduction to zero-knowledge proofs with applications to cryptography
- How to construct zero-knowledge proof systems for NP
- An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
- A tutorial by Oded Goldreich on zero knowledge proofs
- Salil Vadhan, Vadhan's phd thesis on statistical zero knowledge
- Theory of Computing Course, Cornell University 2009, Zero knowledge proofs
- ↑ 1.0 1.1 Template:Cite paper
- ↑ Template:Cite paper
- ↑ Template:Cite paper
- ↑ Sahai, Amit, and Salil Vadhan. 2003. A complete problem for statistical zero knowledge. Journal of the Association for Computing Machinery 50, no. 2: 196-249
- ↑ Many property agents need to declare for the PIC grant in Singapore. However, not all of them know find out how to do the correct process for getting this PIC scheme from the IRAS. There are a number of steps that you need to do before your software can be approved.
Naturally, you will have to pay a safety deposit and that is usually one month rent for annually of the settlement. That is the place your good religion deposit will likely be taken into account and will kind part or all of your security deposit. Anticipate to have a proportionate amount deducted out of your deposit if something is discovered to be damaged if you move out. It's best to you'll want to test the inventory drawn up by the owner, which can detail all objects in the property and their condition. If you happen to fail to notice any harm not already mentioned within the inventory before transferring in, you danger having to pay for it yourself.
In case you are in search of an actual estate or Singapore property agent on-line, you simply should belief your intuition. It's because you do not know which agent is nice and which agent will not be. Carry out research on several brokers by looking out the internet. As soon as if you end up positive that a selected agent is dependable and reliable, you can choose to utilize his partnerise in finding you a home in Singapore. Most of the time, a property agent is taken into account to be good if he or she locations the contact data on his website. This may mean that the agent does not mind you calling them and asking them any questions relating to new properties in singapore in Singapore. After chatting with them you too can see them in their office after taking an appointment.
Have handed an trade examination i.e Widespread Examination for House Brokers (CEHA) or Actual Property Agency (REA) examination, or equal; Exclusive brokers are extra keen to share listing information thus making certain the widest doable coverage inside the real estate community via Multiple Listings and Networking. Accepting a severe provide is simpler since your agent is totally conscious of all advertising activity related with your property. This reduces your having to check with a number of agents for some other offers. Price control is easily achieved. Paint work in good restore-discuss with your Property Marketing consultant if main works are still to be done. Softening in residential property prices proceed, led by 2.8 per cent decline within the index for Remainder of Central Region
Once you place down the one per cent choice price to carry down a non-public property, it's important to accept its situation as it is whenever you move in – faulty air-con, choked rest room and all. Get round this by asking your agent to incorporate a ultimate inspection clause within the possibility-to-buy letter. HDB flat patrons routinely take pleasure in this security net. "There's a ultimate inspection of the property two days before the completion of all HDB transactions. If the air-con is defective, you can request the seller to repair it," says Kelvin.
15.6.1 As the agent is an intermediary, generally, as soon as the principal and third party are introduced right into a contractual relationship, the agent drops out of the image, subject to any problems with remuneration or indemnification that he could have against the principal, and extra exceptionally, against the third occasion. Generally, agents are entitled to be indemnified for all liabilities reasonably incurred within the execution of the brokers´ authority.
To achieve the very best outcomes, you must be always updated on market situations, including past transaction information and reliable projections. You could review and examine comparable homes that are currently available in the market, especially these which have been sold or not bought up to now six months. You'll be able to see a pattern of such report by clicking here It's essential to defend yourself in opposition to unscrupulous patrons. They are often very skilled in using highly unethical and manipulative techniques to try and lure you into a lure. That you must also protect your self, your loved ones, and personal belongings as you'll be serving many strangers in your home. Sign a listing itemizing of all of the objects provided by the proprietor, together with their situation. HSR Prime Recruiter 2010 - ↑ Template:Cite paper
- ↑ One of the biggest reasons investing in a Singapore new launch is an effective things is as a result of it is doable to be lent massive quantities of money at very low interest rates that you should utilize to purchase it. Then, if property values continue to go up, then you'll get a really high return on funding (ROI). Simply make sure you purchase one of the higher properties, reminiscent of the ones at Fernvale the Riverbank or any Singapore landed property Get Earnings by means of Renting
In its statement, the singapore property listing - website link, government claimed that the majority citizens buying their first residence won't be hurt by the new measures. Some concessions can even be prolonged to chose teams of consumers, similar to married couples with a minimum of one Singaporean partner who are purchasing their second property so long as they intend to promote their first residential property. Lower the LTV limit on housing loans granted by monetary establishments regulated by MAS from 70% to 60% for property purchasers who are individuals with a number of outstanding housing loans on the time of the brand new housing purchase. Singapore Property Measures - 30 August 2010 The most popular seek for the number of bedrooms in Singapore is 4, followed by 2 and three. Lush Acres EC @ Sengkang
Discover out more about real estate funding in the area, together with info on international funding incentives and property possession. Many Singaporeans have been investing in property across the causeway in recent years, attracted by comparatively low prices. However, those who need to exit their investments quickly are likely to face significant challenges when trying to sell their property – and could finally be stuck with a property they can't sell. Career improvement programmes, in-house valuation, auctions and administrative help, venture advertising and marketing, skilled talks and traisning are continuously planned for the sales associates to help them obtain better outcomes for his or her shoppers while at Knight Frank Singapore. No change Present Rules
Extending the tax exemption would help. The exemption, which may be as a lot as $2 million per family, covers individuals who negotiate a principal reduction on their existing mortgage, sell their house short (i.e., for lower than the excellent loans), or take part in a foreclosure course of. An extension of theexemption would seem like a common-sense means to assist stabilize the housing market, but the political turmoil around the fiscal-cliff negotiations means widespread sense could not win out. Home Minority Chief Nancy Pelosi (D-Calif.) believes that the mortgage relief provision will be on the table during the grand-cut price talks, in response to communications director Nadeam Elshami. Buying or promoting of blue mild bulbs is unlawful.
A vendor's stamp duty has been launched on industrial property for the primary time, at rates ranging from 5 per cent to 15 per cent. The Authorities might be trying to reassure the market that they aren't in opposition to foreigners and PRs investing in Singapore's property market. They imposed these measures because of extenuating components available in the market." The sale of new dual-key EC models will even be restricted to multi-generational households only. The models have two separate entrances, permitting grandparents, for example, to dwell separately. The vendor's stamp obligation takes effect right this moment and applies to industrial property and plots which might be offered inside three years of the date of buy. JLL named Best Performing Property Brand for second year running
The data offered is for normal info purposes only and isn't supposed to be personalised investment or monetary advice. Motley Fool Singapore contributor Stanley Lim would not personal shares in any corporations talked about. Singapore private home costs increased by 1.eight% within the fourth quarter of 2012, up from 0.6% within the earlier quarter. Resale prices of government-built HDB residences which are usually bought by Singaporeans, elevated by 2.5%, quarter on quarter, the quickest acquire in five quarters. And industrial property, prices are actually double the levels of three years ago. No withholding tax in the event you sell your property. All your local information regarding vital HDB policies, condominium launches, land growth, commercial property and more
There are various methods to go about discovering the precise property. Some local newspapers (together with the Straits Instances ) have categorised property sections and many local property brokers have websites. Now there are some specifics to consider when buying a 'new launch' rental. Intended use of the unit Every sale begins with 10 p.c low cost for finish of season sale; changes to 20 % discount storewide; follows by additional reduction of fiftyand ends with last discount of 70 % or extra. Typically there is even a warehouse sale or transferring out sale with huge mark-down of costs for stock clearance. Deborah Regulation from Expat Realtor shares her property market update, plus prime rental residences and houses at the moment available to lease Esparina EC @ Sengkang - ↑ 20 year-old Real Estate Agent Rusty from Saint-Paul, has hobbies and interests which includes monopoly, property developers in singapore and poker. Will soon undertake a contiki trip that may include going to the Lower Valley of the Omo.
My blog: http://www.primaboinca.com/view_profile.php?userid=5889534 - ↑ Template:Cite paper
- ↑ One of the biggest reasons investing in a Singapore new launch is an effective things is as a result of it is doable to be lent massive quantities of money at very low interest rates that you should utilize to purchase it. Then, if property values continue to go up, then you'll get a really high return on funding (ROI). Simply make sure you purchase one of the higher properties, reminiscent of the ones at Fernvale the Riverbank or any Singapore landed property Get Earnings by means of Renting
In its statement, the singapore property listing - website link, government claimed that the majority citizens buying their first residence won't be hurt by the new measures. Some concessions can even be prolonged to chose teams of consumers, similar to married couples with a minimum of one Singaporean partner who are purchasing their second property so long as they intend to promote their first residential property. Lower the LTV limit on housing loans granted by monetary establishments regulated by MAS from 70% to 60% for property purchasers who are individuals with a number of outstanding housing loans on the time of the brand new housing purchase. Singapore Property Measures - 30 August 2010 The most popular seek for the number of bedrooms in Singapore is 4, followed by 2 and three. Lush Acres EC @ Sengkang
Discover out more about real estate funding in the area, together with info on international funding incentives and property possession. Many Singaporeans have been investing in property across the causeway in recent years, attracted by comparatively low prices. However, those who need to exit their investments quickly are likely to face significant challenges when trying to sell their property – and could finally be stuck with a property they can't sell. Career improvement programmes, in-house valuation, auctions and administrative help, venture advertising and marketing, skilled talks and traisning are continuously planned for the sales associates to help them obtain better outcomes for his or her shoppers while at Knight Frank Singapore. No change Present Rules
Extending the tax exemption would help. The exemption, which may be as a lot as $2 million per family, covers individuals who negotiate a principal reduction on their existing mortgage, sell their house short (i.e., for lower than the excellent loans), or take part in a foreclosure course of. An extension of theexemption would seem like a common-sense means to assist stabilize the housing market, but the political turmoil around the fiscal-cliff negotiations means widespread sense could not win out. Home Minority Chief Nancy Pelosi (D-Calif.) believes that the mortgage relief provision will be on the table during the grand-cut price talks, in response to communications director Nadeam Elshami. Buying or promoting of blue mild bulbs is unlawful.
A vendor's stamp duty has been launched on industrial property for the primary time, at rates ranging from 5 per cent to 15 per cent. The Authorities might be trying to reassure the market that they aren't in opposition to foreigners and PRs investing in Singapore's property market. They imposed these measures because of extenuating components available in the market." The sale of new dual-key EC models will even be restricted to multi-generational households only. The models have two separate entrances, permitting grandparents, for example, to dwell separately. The vendor's stamp obligation takes effect right this moment and applies to industrial property and plots which might be offered inside three years of the date of buy. JLL named Best Performing Property Brand for second year running
The data offered is for normal info purposes only and isn't supposed to be personalised investment or monetary advice. Motley Fool Singapore contributor Stanley Lim would not personal shares in any corporations talked about. Singapore private home costs increased by 1.eight% within the fourth quarter of 2012, up from 0.6% within the earlier quarter. Resale prices of government-built HDB residences which are usually bought by Singaporeans, elevated by 2.5%, quarter on quarter, the quickest acquire in five quarters. And industrial property, prices are actually double the levels of three years ago. No withholding tax in the event you sell your property. All your local information regarding vital HDB policies, condominium launches, land growth, commercial property and more
There are various methods to go about discovering the precise property. Some local newspapers (together with the Straits Instances ) have categorised property sections and many local property brokers have websites. Now there are some specifics to consider when buying a 'new launch' rental. Intended use of the unit Every sale begins with 10 p.c low cost for finish of season sale; changes to 20 % discount storewide; follows by additional reduction of fiftyand ends with last discount of 70 % or extra. Typically there is even a warehouse sale or transferring out sale with huge mark-down of costs for stock clearance. Deborah Regulation from Expat Realtor shares her property market update, plus prime rental residences and houses at the moment available to lease Esparina EC @ Sengkang - ↑ Template:Cite paper