Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification

被引:1
|
作者
Belling, Alexandre [1 ]
Soleimanian, Azam [1 ]
Begassat, Olivier [1 ]
机构
[1] Consensys, Linea, Ft Worth, TX 73779 USA
来源
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023 | 2023年
关键词
SNARK; Hash Verification; Proof Recursion; Proof Composition; GKR; Public-Coin; Fiat Shamir; So-Far Digest Model;
D O I
10.1145/3576915.3623078
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of computation integrity at scale. In this area, multiple works have introduced SNARK-friendly cryptographic primitives: hashing, but also encryption and signature verification. Despite all the efforts to create cryptographic primitives that can be proved faster, it remains a major performance hole in practice. In this paper, we present a recursive technique that can improve the efficiency of the prover by an order of magnitude compared to proving MiMC hashes (a SNARK-friendly hash function, Albrecht et al. 2016) with a Groth16 (Eurocrypt 2016) proof. We use GKR (a well-known public-coin argument system by Goldwasser et al., STOC 2008) to prove the integrity of hash computations and embed the GKR verifier inside a SNARK circuit. The challenge comes from the fact that GKR is a public-coin interactive protocol, and applying Fiat-Shamir naively may result in worse performance than applying existing techniques directly. This is because Fiat-Shamir itself is involved with hash computation over a large string. We take advantage of a property that SNARK schemes commonly have, to build a protocol in which the Fiat-Shamir hashes have very short inputs. The technique we present is generic and can be applied over any SNARK-friendly hash, most known SNARK schemes, and any (one-round) public-coin argument system in place of GKR. We emphasize that while our general compiler is secure in the random oracle model, our concrete instantiation (i.e., GKR plus outer SNARK) is only proved to be heuristically secure. This is due to the fact we first need to convert the GKR protocol to a one-round protocol. Thus, the random oracle of GKR, starting from the second round, is replaced with a concrete hash inside the outer layer SNARK which makes the security-proof heuristic.
引用
收藏
页码:1422 / 1436
页数:15
相关论文
共 8 条
  • [1] Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
    Canetti, Ran
    Lin, Huijia
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 80 - 99
  • [2] Public-Coin Statistical Zero-Knowledge Batch Verification Against Malicious Verifiers
    Kaslasi, Inbar
    Rothblum, Ron D.
    Vasudevanr, Prashant Nalini
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT III, 2021, 12698 : 219 - 246
  • [3] Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System
    Delpech de Saint Guilhem, Cyprien
    Orsini, Emmanuela
    Tanguy, Titouan
    Verbauwhede, Michiel
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 615 - 638
  • [4] Interactive proof systems with public coin: Lower space bounds and hierarchies of complexity classes
    Liskiewicz, M
    STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 129 - 140
  • [5] Hash Proof Systems over Lattices Revisited
    Benhamouda, Fabrice
    Blazy, Olivier
    Ducas, Leo
    Quach, Willy
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 644 - 674
  • [6] Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash
    Kiyoshima, Susumu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 444 - 473
  • [7] Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
    Li, Zengpeng
    Wang, Jiuru
    Zhang, Wenyin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3337 - 3347
  • [8] Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
    Zengpeng Li
    Jiuru Wang
    Wenyin Zhang
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3337 - 3347