Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3576915.3623078acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification

Published: 21 November 2023 Publication History

Abstract

SNARK is a well-known family of cryptographic tools that is increasingly used in the field of computation integrity at scale. In this area, multiple works have introduced SNARK-friendly cryptographic primitives: hashing, but also encryption and signature verification. Despite all the efforts to create cryptographic primitives that can be proved faster, it remains a major performance hole in practice. In this paper, we present a recursive technique that can improve the efficiency of the prover by an order of magnitude compared to proving MiMC hashes (a SNARK-friendly hash function, Albrecht et al. 2016) with a Groth16 (Eurocrypt 2016) proof. We use GKR (a well-known public-coin argument system by Goldwasser et al., STOC 2008) to prove the integrity of hash computations and embed the GKR verifier inside a SNARK circuit. The challenge comes from the fact that GKR is a public-coin interactive protocol, and applying Fiat-Shamir naively may result in worse performance than applying existing techniques directly. This is because Fiat-Shamir itself is involved with hash computation over a large string. We take advantage of a property that SNARK schemes commonly have, to build a protocol in which the Fiat-Shamir hashes have very short inputs. The technique we present is generic and can be applied over any SNARK-friendly hash, most known SNARK schemes, and any (one-round) public-coin argument system in place of GKR. We emphasize that while our general compiler is secure in the random oracle model, our concrete instantiation (i.e., GKR plus outer SNARK) is only proved to be heuristically secure. This is due to the fact we first need to convert the GKR protocol to a one-round protocol. Thus, the random oracle of GKR, starting from the second round, is replaced with a concrete hash inside the outer layer SNARK which makes the security-proof heuristic.

References

[1]
Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In ASIACRYPT 2016, Proceedings, Part I (LNCS, Vol. 10031). Springer, 191--219.
[2]
Paulo S. L. M. Barreto and Michael Naehrig. 2005. Pairing-Friendly Elliptic Curves of Prime Order. In SAC 2005 (LNCS, Vol. 3897). Springer, 319--331.
[3]
Alexandre Belling, Azam Soleimanian, and Olivier Bégassat. 2022. Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. IACR Cryptol. ePrint Arch. (2022), 1072.
[4]
Eli Ben-sasson, Alessandro Chiesa, and Nicholas Spooner. 2016. Interactive Oracle Proofs. In TCC 2016-B (LNCS, Vol. 9986). Springer, 31--60.
[5]
John Black, Phillip Rogaway, and Thomas Shrimpton. 2002. Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In CRYPTO (LNCS, Vol. 2442). Springer, 320--335.
[6]
Dan Boneh, Justin Drake, Ben Fisch, and Ariel Gabizon. 2020. Efficient polynomial commitment schemes for multiple points and polynomials. IACR Cryptol. ePrint Arch. (2020), 81.
[7]
Sean Bowe, Jack Grigg, and Daira Hopwood. 2019. Halo: Recursive Proof Composition without a Trusted Setup. IACR Cryptol. ePrint Arch. (2019), 1021.
[8]
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, and Psi Vesely. 2021. Proofs for Inner Pairing Products and Applications. In ASIACRYPT (LNCS, Vol. 13092). Springer, 65--97.
[9]
Vitalik Buterin. 2019. On-chain scaling at potentially 500 transactions per seconds. ethresearch/3477.
[10]
Matteo Campanelli, Dario Fiore, and Anaïs Querol. 2019. LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. In ACM SIGSAC, CCS. ACM, 2075--2092.
[11]
Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, and Ron D. Rothblum. 2018. Fiat-Shamir From Simpler Assumptions. IACR Cryptol. ePrint Arch. (2018), 1004.
[12]
Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Noah Vesely, and Nicholas Ward. 2020. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In EUROCRYPT (LNCS, Vol. 12105). Springer, 738--768.
[13]
Arka Choudhuri, Pavel Hubá?ek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, and Guy Rothblum. 2019. Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. In ACM, STOC. 1103--1114.
[14]
Georg Fuchsbauer, Eike Kiltz, and Julian Loss. 2018. The Algebraic Group Model and its Applications. In CRYPTO (LNCS, Vol. 10992). Springer, 33--62.
[15]
Ariel Gabizon and Zachary J. Williamson. 2020. Plookup: A simplified polynomial protocol for lookup tables. IACR Cryptol. ePrint Arch. (2020), 315.
[16]
Ariel Gabizon, Zachary J. Williamson, and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. IACR Cryptol. ePrint Arch. (2019), 953.
[17]
Oded Goldreich. 2018. On Doubly-Efficient Interactive Proof Systems. Found. Trends Theor. Comput. Sci. 13, 3 (2018), 158--246.
[18]
Shafi Goldwasser, Yael Kalai, and Guy Rothblum. 2008. Delegating Computation: Interactive Proofs for Muggles. In ACM STOC. ACM, 113--122.
[19]
Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2019. Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. IACR Cryptol. ePrint Arch. (2019), 458.
[20]
Jens Groth. 2016. On the Size of Pairing-Based Non-interactive Arguments. In Eurocrypt (LNCS, Vol. 9666). Springer, 305--326.
[21]
Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2022. Zcash protocol specification: Version 2022.04.26 Technical report, Zerocoin Electric Coin Company. https://github.com/zcash/zips/blob/main/protocol/protocol.pdf.
[22]
Aniket Kate, Gregory Zaverucha, and Ian Goldberg. 2010. Constant-Size Commitments to Polynomials and Their Applications. In ASIACRYPT (LNCS, Vol. 6477). Springer, 177--194.
[23]
Abhiram Kothapalli, Srinath T. V. Setty, and Ioanna Tzialla. 2022. Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. In CRYPTO 2022, Proceedings, Part IV (LNCS, Vol. 13510). Springer, 359--388.
[24]
Yehuda Lindell. 2001. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In CRYPTO (LNCS, Vol. 2139). Springer, 171--189.
[25]
Carsten Lund, Lance Fortnow, Howard Karloff, and Noam Nisan. 1990. Algebraic Methods for Interactive Proof Systems. In FOCS. IEEE Computer Society, 2--10.
[26]
Mary Maller, Sean Bowe, Markulf Kohlweiss, and Sarah Meiklejohn. 2019. Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings. In ACM SIGSAC -CCS. ACM, 2111--2128.
[27]
Polygon. 2022. Polygon zkEVM Documentation, zkProver. https://docs.hermez.io/zkEVM/Overview/Overview/.
[28]
Bart Preneel. 1997. Hash Functions and MAC Algorithms Based on Block Ciphers. In Cryptography and Coding, IMA (LNCS, Vol. 1355). Springer, 270--282.
[29]
Srinath T. V. Setty. 2020. Spartan: Efficient and General-Purpose zkSNARKs With-out Trusted Setup. In CRYPTO, Proceedings, Part III (LNCS, Vol. 12172). Springer, 704--737.
[30]
Riad Wahby, Ye Ji, Andrew Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, and Thomas Wies. 2017. Full Accounting for Verifiable Outsourcing. In ACM SIGSAC -CCS. ACM, 2071--2086.
[31]
Riad Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, and Michael Walfish. 2018. Doubly-Efficient zkSNARKs Without Trusted Setup. In SP. IEEE Computer Society, 926--943.
[32]
Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. 2019. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In CRYPTO (LNCS, Vol. 11694). Springer, 733--764.
[33]
Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, and Yupeng Zhang. 2021. Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. In ACM SIGSAC -CCS. ACM, 159--177.
[34]
Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, and Dawn Song. 2020. Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. In IEEE, SP. IEEE, 859--876.
[35]
William Zhang and Yu Xia. 2021. Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge. IACR Cryptol. ePrint Arch. (2021), 641.

Cited By

View all
  • (2024)Polymath: Groth16 Is Not the LimitAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68403-6_6(170-206)Online publication date: 16-Aug-2024
  • (2024)Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate SignaturesAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68376-3_1(3-38)Online publication date: 16-Aug-2024

Index Terms

  1. Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
      November 2023
      3722 pages
      ISBN:9798400700507
      DOI:10.1145/3576915
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 November 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. fiat shamir
      2. gkr
      3. hash verification
      4. proof composition
      5. proof recursion
      6. public-coin
      7. snark
      8. so-far digest model

      Qualifiers

      • Research-article

      Conference

      CCS '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)179
      • Downloads (Last 6 weeks)14
      Reflects downloads up to 02 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Polymath: Groth16 Is Not the LimitAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68403-6_6(170-206)Online publication date: 16-Aug-2024
      • (2024)Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate SignaturesAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68376-3_1(3-38)Online publication date: 16-Aug-2024

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media