Abstract
We design and implement a simple zero-knowledge argument protocol for NP whose communication complexity is proportional to the square-root of the veriffication circuit size. The protocol can be based on any collision-resistant hash function. Alternatively, it can be made non-interactive in the random oracle model, yielding concretely ecient zk-SNARKs that do not require a trusted setup or public-key cryptography. Our protocol is attractive not only for very large verification circuits but also for moderately large circuits that arise in applications. For instance, for verifying a SHA-256 preimage in zeroknowledge with 2-40 soundness error, the communication complexity is roughly 44KB (or less than 34KB under a plausible conjecture), the prover running time is 140 ms, and the verifier running time is 62 ms. This proof is roughly 4 times shorter than a similar proof of ZKB++ (Chase et al., CCS 2017), an optimized variant of ZKBoo (Giacomelli et al., USENIX 2016). The communication complexity of our protocol is independent of the circuit structure and depends only on the number of gates. For 2-40 soundness error, the communication becomes smaller than the circuit size for circuits containing roughly 3 million gates or more. Our efficiency advantages become even bigger in an amortized setting, where several instances need to be proven simultaneously. Our zero-knowledge protocol is obtained by applying an optimized version of the general transformation of Ishai et al. (STOC 2007) to a variant of the protocol for secure multiparty computation of Damgård and Ishai (Crypto 2006). It can be viewed as a simple zero-knowledge interactive PCP based on "interleaved" Reed-Solomon codes.
Original language | English |
---|---|
Title of host publication | CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | Association for Computing Machinery |
Pages | 2087-2104 |
Number of pages | 18 |
ISBN (Electronic) | 9781450349468 |
DOIs | |
State | Published - 30 Oct 2017 |
Event | 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 - Dallas, United States Duration: 30 Oct 2017 → 3 Nov 2017 |
Publication series
Name | Proceedings of the ACM Conference on Computer and Communications Security |
---|---|
ISSN (Print) | 1543-7221 |
Conference
Conference | 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 |
---|---|
Country/Territory | United States |
City | Dallas |
Period | 30/10/17 → 3/11/17 |
Bibliographical note
Publisher Copyright:© 2017 author(s).
Funding
The first and last authors were supported by Google Faculty Research Grant and NSF Awards CNS-1526377 and CNS-1618884. The second author was supported by the European Research Council under the ERC consolidators grant agreement n. 615172 (HIPS).
Funders | Funder number |
---|---|
ERC consolidators | |
Google Faculty Research | |
NSF Awards CNS-1526377 | CNS-1618884, CNS-1526377 |
Horizon 2020 Framework Programme | 742754 |
National Council for Eurasian and East European Research | |
European Commission | 615172 |
Norsk Sykepleierforbund |