Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

被引:89
作者
Aly, Abdelrahaman [1 ]
Ashur, Tomer [1 ,2 ]
Ben-Sasson, Eli [3 ]
Dhooghe, Siemen [1 ]
Szepieniec, Alan [1 ,4 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] TU Eindhoven, Eindhoven, Netherlands
[3] StarkWare Ind Ltd, Netanya, Israel
[4] Nervos Fdn, Panama City, Panama
关键词
Vision; Rescue; Marvellous; arithmetization; zero-knowledge proof; STARK; R1CS; MPC; Grobner basis; GROBNER BASES;
D O I
10.13154/tosc.v2020.i3.1-45
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero-knowledge proofs require optimization with respect to a different metric: arithmetic complexity. In this paper we study the design of secure cryptographic algorithms optimized to minimize this metric. We begin by identifying the differences in the design space between such arithmetization-oriented ciphers and traditional ones, with particular emphasis on the available tools, efficiency metrics, and relevant cryptanalysis. This discussion highlights a crucial point- the considerations for designing arithmetization-oriented ciphers are oftentimes different from the considerations arising in the design of software- and hardware-oriented ciphers. The natural next step is to identify sound principles to securely navigate this new terrain, and to materialize these principles into concrete designs. To this end, we present the Marvellous design strategy which provides a generic way to easily instantiate secure and efficient algorithms for this emerging domain. We then show two examples for families following this approach. These families - Vision and Rescue - are benchmarked with respect to three use cases: the ZK-STARK proof system, proof systems based on Rank-One Constraint Satisfaction (R1CS), and Multi-Party Computation (MPC). These benchmarks show that our algorithms achieve a highly compact algebraic description, and thus benefit the advanced cryptographic protocols that employ them.
引用
收藏
页码:1 / 45
页数:45
相关论文
共 54 条
[11]   On the complexity of the F5 Grobner basis algorithm [J].
Bardet, Magali ;
Faugere, Jean-Charles ;
Salvy, Bruno .
JOURNAL OF SYMBOLIC COMPUTATION, 2015, 70 :49-70
[12]  
Bardet Magali, 2004, P INT C POL SYST SOL, P71
[13]  
Ben-Sasson E., 2018, IACR Cryptology ePrint Archive 2018/046, V2018, P46
[14]   Aurora: Transparent Succinct Arguments for R1CS [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Riabzev, Michael ;
Spooner, Nicholas ;
Virza, Madars ;
Ward, Nicholas P. .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 :103-128
[15]   Computational Integrity with a Public Random String from Quasi-Linear PCPs [J].
Ben-Sasson, Eli ;
Bentov, Iddo ;
Chiesa, Alessandro ;
Gabizon, Ariel ;
Genkin, Daniel ;
Hamilis, Matan ;
Pergament, Evgenya ;
Riabzev, Michael ;
Silberstein, Mark ;
Tromer, Eran ;
Virza, Madars .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 :551-579
[16]   Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Gabizon, Ariel ;
Virza, Madars .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :33-64
[17]  
Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
[18]  
Ben-Sasson Eli, STATE STARK TOOLING
[19]  
Ben-Sasson Eli, 2016, CORR
[20]  
Bertoni G, 2007, P ECRYPT HASH WORKSH