Split: A Hash-Based Memory Optimization Method for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK)

被引:4
作者
Qi, Huayi [1 ]
Cheng, Ye [1 ]
Xu, Minghui [1 ]
Yu, Dongxiao [1 ]
Wang, Haipeng [2 ]
Lyu, Weifeng [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
[2] Naval Aviat Univ, Inst Informat Fus, Yantai 264001, Peoples R China
[3] Beihang Univ, Sch Comp Sci & Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Memory management; Central Processing Unit; Security; Optimization; Privacy; Authentication; Smart phones; Memory optimization; privacy; zero-knowledge proof; zk-SNARKs; BLOCKCHAIN; MANAGEMENT; SCHEME; PROOF;
D O I
10.1109/TC.2023.3235975
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) is a practical zero-knowledge proof system for Rank-1 Constraint Satisfaction (R1CS), enabling privacy preservation and addressing the previous scalability concerns on zero-knowledge proofs. Existing constructions of zk-SNARKs require huge memory overhead to generate proofs in that the size of the zk-SNARK circuit can be large even for a very simple use case, which limits the applications for regular resource-constrained users. To reduce the memory utilization of zk-SNARKs, this paper presents a hash-based method "Split". Concretely, Split intends to partition the zk-SNARK circuits so that components can be processed sequentially while ensuring strong security properties leveraging hash circuits. As a zk-SNARK circuit is partitioned, obsolete variables are no longer preserved in the memory. We further propose an enhanced Split as $n$n-Split, which leads to better optimization by properly choosing multiple splits. Our experimental results validate the effectiveness and efficiency of Split in conserving memory usage for resource-constrained provers as long as the circuit can be partitioned to a Good Split, indicating that via Split zk-SNARKs can be brought one step closer to practical applications.
引用
收藏
页码:1857 / 1870
页数:14
相关论文
共 35 条
  • [1] MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
    Albrecht, Martin
    Grassi, Lorenzo
    Rechberger, Christian
    Roy, Arnab
    Tiessen, Tyge
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 191 - 219
  • [2] Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
    Ames, Scott
    Hazay, Carmit
    Ishai, Yuval
    Venkitasubramaniam, Muthuramakrishnan
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2087 - 2104
  • [3] Aurora: Transparent Succinct Arguments for R1CS
    Ben-Sasson, Eli
    Chiesa, Alessandro
    Riabzev, Michael
    Spooner, Nicholas
    Virza, Madars
    Ward, Nicholas P.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 103 - 128
  • [4] Interactive Oracle Proofs
    Ben-Sasson, Eli
    Chiesa, Alessandro
    Spooner, Nicholas
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 31 - 60
  • [5] Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
  • [6] Zerocash: Decentralized Anonymous Payments from Bitcoin
    Ben-Sasson, Eli
    Chiesa, Alessandro
    Garmant, Christina
    Green, Matthew
    Miers, Ian
    Tromer, Eran
    Virza, Madars
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 459 - 474
  • [7] Benet J., 2018, FILECOIN DECENTRALIZ, P1
  • [8] Bitansky N., 2012, ITCS 2012, P326, DOI [10.1145/2090236.2090263, DOI 10.1145/2090236.2090263, 10.1145/ 2090236.2090263]
  • [9] Chin Collin, 2021, 2021651 CRYPT EPRINT
  • [10] Drevon G., 2019, BENCHMARKING ZERO KN