Efficient inner product arguments and their applications in range proofs

被引:2
|
作者
Zhou, Zibo [1 ]
Zhang, Zongyang [1 ,2 ]
Tao, Hongyu [1 ]
Li, Tianyu [1 ]
Zhao, Boyu [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, 37 Xueyuan Rd, Beijing 100191, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
communication complexity; computational complexity; cryptographic protocols; cryptography; ZERO-KNOWLEDGE; CREDENTIALS; NUMBER;
D O I
10.1049/ise2.12111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inner product arguments allow a prover to prove that the inner product of two committed vectors equals a public scalar. They are used to reduce the complexity of many cryptographic primitives, such as range proofs. Range proofs are deployed in numerous applications to prove that a committed value lies in a certain range. As core building blocks, their complexity largely determines the performance of corresponding applications. In this paper, we have optimised the inner product argument with statement including two vector commitments (IPA(tvc)) and range proof of Daza et al. (PKC'20), the inner product argument with statement including only one vector commitment (IPA(ovc)) of Bunz et al. (S & P ' 18). For IPA(tvc), we reduce the concrete communication complexity by 2 log(2)n field elements, where n is the vector dimension. For range proofs, we reduce the concrete communication and prover complexities by about 2 log(2)m field elements and 11m field multiplications, respectively, where m is the bit length of range. For IPA(ovc), we exponentially reduce the asymptotic verifier complexity from linear to logarithmic. Due to the asymptotic characteristics, our protocols are highly competitive when the vector dimension or bit length of range is large.
引用
收藏
页码:485 / 504
页数:20
相关论文
共 50 条
  • [31] Proofs of God: Classical Arguments from Tertullian to Barth
    Siniscalchi, Glenn B.
    REVIEW OF METAPHYSICS, 2019, 72 (03): : 606 - 607
  • [32] Proofs of God: Classical Arguments from Tertullian to Barth
    Schenkewitz, Kyle A.
    NEWMAN STUDIES JOURNAL, 2018, 15 (02) : 79 - 80
  • [33] Highly efficient secrecy-preserving proofs of correctness of computations and applications
    Rabin, Michael O.
    Servedio, Rocco A.
    Thorpe, Christopher
    22ND ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2007, : 63 - +
  • [34] Proofs as efficient programs
    Dal Lago, Ugo
    Martini, Simone
    DEDUCTION, COMPUTATION, EXPERIMENT: EXPLORING THE EFFECTIVENESS OF PROOF, 2008, : 141 - 157
  • [35] Efficient computation of the discrete autocorrelation wavelet inner product matrix
    Eckley, IA
    Nason, GP
    STATISTICS AND COMPUTING, 2005, 15 (02) : 83 - 92
  • [36] Efficient Stochastic Template Bank Using Inner Product Inequalities
    Kacanja, Keisi
    Nitz, Alexander H.
    Wu, Shichao
    Cusinato, Marco
    Dhurkunde, Rahul
    Harry, Ian
    Dal Canton, Tito
    Pannarale, Francesco
    ASTROPHYSICAL JOURNAL, 2024, 975 (02):
  • [37] An efficient public key functional encryption for inner product evaluations
    Kim, Intae
    Park, Jong Hwan
    Hwang, Seong Oun
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (17): : 13117 - 13128
  • [38] An efficient public key functional encryption for inner product evaluations
    Intae Kim
    Jong Hwan Park
    Seong Oun Hwang
    Neural Computing and Applications, 2020, 32 : 13117 - 13128
  • [39] Efficient computation of the discrete autocorrelation wavelet inner product matrix
    Idris A. Eckley
    Guy P. Nason
    Statistics and Computing, 2005, 15 : 83 - 92
  • [40] Efficient Inner Product Encryption with Simulation-Based Security
    Zhao, Qingsong
    Zeng, Qingkai
    Liu, Ximeng
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 162 - 171