Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup

Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while efficient zero-knowledge proofs of algebraic statements have existed for decades, a natural challenge arose to combine algebraic and non-algebraic statements. Chase et al. (CRYPTO 2016) proposed an interactive ZK proof system for this cross-domain problem. As a use case they show that their system can be used to prove knowledge of a RSA/DSA signature on a message m with respect to a publicly known Pedersen commitment. One drawback of their system is that it requires interaction between the prover and the verifier. This is due to the interactive nature of garbled circuits, which are used in their construction. Subsequently, Agrawal et al. (CRYPTO 2018) proposed an efficient non-interactive ZK (NIZK) proof system for cross-domains based on SNARKs, which however require a trusted setup assumption. In this paper, we propose a NIZK proof system for cross-domains that requires no trusted setup and is efficient both for the prover and the verifier. Our system constitutes a combination of Schnorr based ZK proofs and ZK proofs for general circuits by Giacomelli et al. (USENIX 2016). The proof size and the running time of our system are comparable to the approach by Chase et al. Compared to Bulletproofs (SP 2018), a recent NIZK proofs system on committed inputs, our techniques achieve asymptotically better performance on prover and verifier, thus presenting a different trade-off between the proof size and the running time.

Original languageEnglish
Title of host publicationPublic-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
EditorsDongdai Lin, Kazue Sako
PublisherSpringer Verlag
Pages286-313
Number of pages28
ISBN (Print)9783030172527
DOIs
StatePublished - 2019
Event22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019 - Beijing, China
Duration: 14 Apr 201917 Apr 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11442 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019
Country/TerritoryChina
CityBeijing
Period14/04/1917/04/19

Bibliographical note

Publisher Copyright:
© 2019, International Association for Cryptologic Research.

Funding

Acknowledgements. We would like to thank the anonymous reviewers for their valuable comments. This work was supported by the German Research Foundation (DFG) through funding for the project Methoden und Instrumente zum Verständnis und zur Kontrolle von Datenschutz (SFB1223/1) and by the German Federal Ministry of Education and Research (BMBF) through funding for CISPA and the CISPA-Stanford Center for Cybersecurity (FKZ: 16KIS0762).

FundersFunder number
National Science Foundation1719196
CISPA Helmholtz-Zentrum für Informationssicherheit
Deutsche ForschungsgemeinschaftSFB1223/1
Bundesministerium für Bildung und Forschung
CISPA-Stanford Center for Cybersecurity16KIS0762

    Fingerprint

    Dive into the research topics of 'Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup'. Together they form a unique fingerprint.

    Cite this