Compressing Proofs of k-Out-Of-n Partial Knowledge

被引:21
作者
Attema, Thomas [1 ,2 ,3 ]
Cramer, Ronald [1 ,2 ]
Fehr, Serge [1 ,2 ]
机构
[1] CWI, Cryptol Grp, Amsterdam, Netherlands
[2] Leiden Univ, Math Inst, Leiden, Netherlands
[3] TNO, Cyber Secur & Robustness, The Hague, Netherlands
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV | 2021年 / 12828卷
基金
欧盟地平线“2020”;
关键词
ZERO-KNOWLEDGE; SIGNATURES;
D O I
10.1007/978-3-030-84259-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a proof of partial knowledge, introduced by Cramer, Damgard and Schoenmakers (CRYPTO 1994), a prover knowing witnesses for some k-subset of n given public statements can convince the verifier of this claim without revealing which k-subset. Their solution combines Sigma-protocol theory and linear secret sharing, and achieves linear communication complexity for general k, n. Especially the "one-out-of-n" case k=1 has seen myriad applications during the last decades, e.g., in electronic voting, ring signatures, and confidential transaction systems. In this paper we focus on the discrete logarithm (DL) setting, where the prover claims knowledge of DLs of k-out-of-n given elements. Groth and Kohlweiss (EUROCRYPT 2015) have shown how to solve the special case k=1 with logarithmic (in n) communication, instead of linear as prior work. However, their method takes explicit advantage of k=1 and does not generalize to k>1. Alternatively, an indirect approach for solving the considered problem is by translating the k-out-of-n relation into a circuit and then applying communication-efficient circuit ZK. For k=1 this approach has been highly optimized, e.g., in ZCash. Our main contribution is a new, simple honest-verifier zero-knowledge proof protocol for proving knowledge of k out of n DLs with logarithmic communication and for general k and n, without requiring any generic circuit ZK machinery. Our solution puts forward a novel extension of the compressed Sigma-protocol theory (CRYPTO 2020), which we then utilize to compress a new Sigma-protocol for proving knowledge of k-out-of-n DL's down to logarithmic size. The latter Sigma-protocol is inspired by the CRYPTO 1994 approach, but a careful re-design of the original protocol is necessary for the compression technique to apply. Interestingly, even for k=1 and general n our approach improves prior direct approaches as it reduces prover complexity without increasing the communication complexity. Besides the conceptual simplicity, we also identify regimes of practical relevance where our approach achieves asymptotic and concrete improvements, e.g., in proof size and prover complexity, over the generic approach based on circuit-ZK. Finally, we show various extensions and generalizations of our core result. For instance, we extend our protocol to proofs of partial knowledge of Pedersen (vector) commitment openings, and/or to include a proof that the witness satisfies some additional constraint, and we show how to extend our results to non-threshold access structures.
引用
收藏
页码:65 / 91
页数:27
相关论文
共 32 条
  • [1] Structure-Preserving Signatures and Commitments to Group Elements
    Abe, Masayuki
    Fuchsbauer, Georg
    Groth, Jens
    Haralambiev, Kristiyan
    Ohkubo, Miyako
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 363 - 421
  • [2] [Anonymous], 1996, Ph.D. thesis
  • [3] Attema T., 2020, CRYPTO, V12172, P513, DOI 10.1007/978-3-030-56877-1_18
  • [4] Attema T., 2021, CRYPTO
  • [5] Benaloh J. C., 1993, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, V765, P274, DOI 10.1007/3-540-48285-7_24
  • [6] Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
    Bootle, Jonathan
    Cerulli, Andrea
    Chaidos, Pyrros
    Groth, Jens
    Petit, Christophe
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 327 - 357
  • [7] Short Accountable Ring Signatures Based on DDH
    Bootle, Jonathan
    Cerulli, Andrea
    Chaidos, Pyrros
    Ghadafi, Essam
    Groth, Jens
    Petit, Christophe
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 243 - 265
  • [8] Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
  • [9] Zether: Towards Privacy in a Smart Contract World
    Bunz, Benedikt
    Agrawal, Shashank
    Zamani, Mahdi
    Boneh, Dan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 423 - 443
  • [10] Bulletproofs: Short Proofs for Confidential Transactions and More
    Bunz, Benedikt
    Bootle, Jonathan
    Boneh, Dan
    Poelstra, Andrew
    Wuille, Pieter
    Maxwell, Greg
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 315 - 334