Recursive Proof Composition from Accumulation Schemes

被引:30
作者
Bunz, Benedikt [1 ]
Chiesa, Alessandro [2 ]
Mishra, Pratyush [2 ]
Spooner, Nicholas [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2020, PT II | 2020年 / 12551卷
关键词
Succinct arguments; Proof-carrying data; Recursive proof composition; CYCLES;
D O I
10.1007/978-3-030-64378-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recursive proof composition has been shown to lead to powerful primitives such as incrementally-verifiable computation (IVC) and proof-carrying data (PCD). All existing approaches to recursive composition take a succinct non-interactive argument of knowledge (SNARK) and use it to prove a statement about its own verifier. This technique requires that the verifier run in time sub-linear in the size of the statement it is checking, a strong requirement that restricts the class of SNARKs from which PCD can be built. This in turn restricts the efficiency and security properties of the resulting scheme. Bowe, Grigg, and Hopwood (ePrint 2019/1021) outlined a novel approach to recursive composition, and applied it to a particular SNARK construction which does not have a sublinear-time verifier. However, they omit details about this approach and do not prove that it satisfies any security property. Nonetheless, schemes based on their ideas have already been implemented in software. In this work we present a collection of results that establish the theoretical foundations for a generalization of the above approach. We define an accumulation scheme for a non-interactive argument, and show that this suffices to construct PCD, even if the argument itself does not have a sublinear-time verifier. Moreover we give constructions of accumulation schemes for SNARKs, which yield PCD schemes with novel efficiency and security features.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 28 条
[1]   Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [J].
Ames, Scott ;
Hazay, Carmit ;
Ishai, Yuval ;
Venkitasubramaniam, Muthuramakrishnan .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2087-2104
[2]  
Assimakis K., 2020, PROOF NECESSARY WORK
[3]   Aurora: Transparent Succinct Arguments for R1CS [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Riabzev, Michael ;
Spooner, Nicholas ;
Virza, Madars ;
Ward, Nicholas P. .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 :103-128
[4]  
Ben-Sasson E, 2014, LECT NOTES COMPUT SC, V8617, P276, DOI 10.1007/978-3-662-44381-1_16
[5]  
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P111
[6]  
Bonneau J., 2020, Coda: Decentralized Cryp- tocurrency at Scale, P47
[7]   Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability [J].
Bootle, Jonathan ;
Cerulli, Andrea ;
Ghadafi, Essam ;
Groth, Jens ;
Hajiabadi, Mohammad ;
Jakobsen, Sune K. .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 :336-365
[8]   Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting [J].
Bootle, Jonathan ;
Cerulli, Andrea ;
Chaidos, Pyrros ;
Groth, Jens ;
Petit, Christophe .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :327-357
[9]   Bulletproofs: Short Proofs for Confidential Transactions and More [J].
Bunz, Benedikt ;
Bootle, Jonathan ;
Boneh, Dan ;
Poelstra, Andrew ;
Wuille, Pieter ;
Maxwell, Greg .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :315-334
[10]  
Chiesa A., 2020, P 11 INN THEOR COMP, P1