Abstract
We explore Zero-Knowledge Proofs (ZKPs) of statements expressed as programs written in high-level languages, e.g., C or assembly. At the core of executing such programs in ZK is the repeated evaluation of a CPU step, achieved by branching over the CPU’s instruction set. This approach is general and covers traversal-execution of a program’s control flow graph (CFG): here CPU instructions are straight-line program fragments (of various sizes) associated with the CFG nodes. This highlights the usefulness of ZK CPUs with a large number of instructions of varying sizes. We formalize and design an efficient tight ZK CPU, where the cost (both computation and communication, for each party) of each step depends only on the instruction taken. This qualitatively improves over state of the art, where cost scales with the size of the largest CPU instruction (largest CFG node). Our technique is formalized in the standard commit-and-prove paradigm, so our results are compatible with a variety of (interactive and non-interactive) general-purpose ZK. We implemented an interactive tight arithmetic (over F261-1) ZK CPU based on Vector Oblivious Linear Evaluation (VOLE) and compared it to the state-of-the-art non-tight VOLE-based ZK CPU Batchman (Yang et al. CCS’23). In our experiments, under the same hardware configuration, we achieve comparable performance when instructions are of the same size and a 5-18× improvement when instructions are of varied size. Our VOLE-based tight ZK CPU (over F261-1) can execute 100K (resp. 450K) multiplication gates per second in a WAN-like (resp. LAN-like) setting. It requires = 102 Bytes per multiplication gate. Our basic building block, ZK Unbalanced Read-Only Memory, may be of independent interest.
Original language | English |
---|---|
Title of host publication | CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | Association for Computing Machinery, Inc |
Pages | 3095-3109 |
Number of pages | 15 |
ISBN (Electronic) | 9798400706363 |
DOIs | |
State | Published - 9 Dec 2024 |
Event | 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 - Salt Lake City, United States Duration: 14 Oct 2024 → 18 Oct 2024 |
Publication series
Name | CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security |
---|
Conference
Conference | 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 |
---|---|
Country/Territory | United States |
City | Salt Lake City |
Period | 14/10/24 → 18/10/24 |
Bibliographical note
Publisher Copyright:© 2024 Copyright held by the owner/author(s).
Keywords
- CPU Emulation
- Disjunctive Statements
- Zero-Knowledge