Aurora: Transparent Succinct Arguments for R1CS

被引:219
作者
Ben-Sasson, Eli [1 ]
Chiesa, Alessandro [2 ]
Riabzev, Michael [1 ]
Spooner, Nicholas [2 ]
Virza, Madars [3 ]
Ward, Nicholas P. [2 ]
机构
[1] Technion STARKWare, Haifa, Israel
[2] Univ Calif Berkeley, Berkeley, CA 94704 USA
[3] MIT, Media Lab, Cambridge, MA 02139 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I | 2019年 / 11476卷
基金
美国国家科学基金会; 以色列科学基金会;
关键词
Zero knowledge; Interactive Oracle Proofs; Succinct arguments; Sumcheck protocol; INTERACTIVE PROOFS; ZERO-KNOWLEDGE; COMPLEXITY; HARDNESS;
D O I
10.1007/978-3-030-17653-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We design, implement, and evaluate a zero knowledge succinct non-interactive argument (SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language undergoing standardization. Our SNARG has a transparent setup, is plausibly post-quantum secure, and uses lightweight cryptography. A proof attesting to the satisfiability of n constraints has size O(log(2) n); it can be produced with O(n log n) field operations and verified with O(n). At 128 bits of security, proofs are less than 250 kB even for several million constraints, more than 10x shorter than prior SNARGs with similar features. A key ingredient of our construction is a new Interactive Oracle Proof (IOP) for solving a univariate analogue of the classical sumcheck problem [LFKN92], originally studied for multivariate polynomials. Our protocol verifies the sum of entries of a Reed-Solomon codeword over any subgroup of a field. We also provide libiop, a library for writing IOP-based arguments, in which a toolchain of transformations enables programmers to write new arguments by writing simple IOP sub-components. We have used this library to specify our construction and prior ones, and plan to open-source it.
引用
收藏
页码:103 / 128
页数:26
相关论文
共 82 条
[1]   Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [J].
Ames, Scott ;
Hazay, Carmit ;
Ishai, Yuval ;
Venkitasubramaniam, Muthuramakrishnan .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2087-2104
[2]  
[Anonymous], P 26 ANN IEEE C COMP
[3]  
[Anonymous], 2016, Post-quantum cryptography
[4]  
[Anonymous], 2017, ZERO KNOWLEDGE PROOF
[5]  
[Anonymous], 2016, The Zcash Ceremony
[6]   Proof verification and the hardness of approximation problems [J].
Arora, S ;
Lund, C ;
Motwani, R ;
Sudan, M ;
Szegedy, M .
JOURNAL OF THE ACM, 1998, 45 (03) :501-555
[7]   Probabilistic checking of proofs: A new characterization of NP [J].
Arora, S ;
Safra, S .
JOURNAL OF THE ACM, 1998, 45 (01) :70-122
[8]  
Aumasson J., 2014, Information Security and Cryptography, DOI [10.1007/978-3-662-44757-4, DOI 10.1007/978-3-662-44757-4]
[9]  
Aumasson Jean-Philippe., 2013, BLAKE2: simpler, smaller, fast as MD5, DOI [10.1007/978-3-642-38980-1_8, DOI 10.1007/978-3-642]
[10]  
Babai L., 1991, Computational Complexity, V1, P3, DOI 10.1007/BF01200056