Abstract
Sigma protocols are elegant cryptographic proofs that have become a cornerstone of modern cryptography. A notable example is Schnorr’s protocol, a zero-knowledge proof-of-knowledge of a discrete logarithm. Despite extensive research, the security of Schnorr’s protocol in the standard model is not fully understood. In this paper we study Kilian’s protocol, an influential public-coin interactive protocol that, while not a sigma protocol, shares striking similarities with sigma protocols. The first example of a succinct argument, Kilian’s protocol is proved secure via rewinding, the same idea used to prove sigma protocols secure. In this paper we show how, similar to Schnorr’s protocol, a precise understanding of the security of Kilian’s protocol remains elusive. We contribute new insights via upper bounds and lower bounds. Upper bounds. We establish the tightest known bounds on the security of Kilian’s protocol in the standard model, via strict-time reductions and via expected-time reductions. Prior analyses are strict-time reductions that incur large overheads or assume restrictive properties of the PCP underlying Kilian’s protocol.Lower bounds. We prove that significantly improving on the bounds that we establish for Kilian’s protocol would imply improving the security analysis of Schnorr’s protocol beyond the current state-of-the-art (an open problem). This partly explains the difficulties in obtaining tight bounds for Kilian’s protocol. Upper bounds. We establish the tightest known bounds on the security of Kilian’s protocol in the standard model, via strict-time reductions and via expected-time reductions. Prior analyses are strict-time reductions that incur large overheads or assume restrictive properties of the PCP underlying Kilian’s protocol. Lower bounds. We prove that significantly improving on the bounds that we establish for Kilian’s protocol would imply improving the security analysis of Schnorr’s protocol beyond the current state-of-the-art (an open problem). This partly explains the difficulties in obtaining tight bounds for Kilian’s protocol.
Original language | English |
---|---|
Title of host publication | Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings |
Editors | Elette Boyle, Elette Boyle, Mohammad Mahmoody |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 158-188 |
Number of pages | 31 |
ISBN (Print) | 9783031780103 |
DOIs | |
State | Published - 2025 |
Event | 22nd Theory of Cryptography Conference, TCC 2024 - Milan, Italy Duration: 2 Dec 2024 → 6 Dec 2024 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 15364 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 22nd Theory of Cryptography Conference, TCC 2024 |
---|---|
Country/Territory | Italy |
City | Milan |
Period | 2/12/24 → 6/12/24 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2025.
Keywords
- succinct interactive arguments
- vector commitment schemes