Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience

被引:1
作者
Weiss, Mor [1 ]
机构
[1] Bar Ilan Univ, Alexander Kofkin Fac Engn, IL-5290002 Ramat Gan, Israel
关键词
Probabilistically Checkable Proofs; zero knowledge; leakage resilience; NON-MALLEABLE ENCRYPTION; BLACK-BOX CONSTRUCTION; CIRCUITS;
D O I
10.3390/e24070970
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Probabilistically Checkable Proofs (PCPs) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form "x is an element of L" by querying only a few proof bits. Zero-Knowledge PCPs (ZK-PCPs) enhance standard PCPs to additionally guarantee that the view of any (possibly malicious) verifier querying a bounded number of proof bits can be efficiently simulated up to a small statistical distance. The first ZK-PCP construction of Kilian, Petrank and Tardos (STOC 1997), and following constructions employing similar techniques, necessitate that the honest verifier makes several rounds of queries to the proof. This undesirable property, which is inherent to their technique, translates into increased round complexity in cryptographic applications of ZK-PCPs. We survey two recent ZK-PCP constructions-due to Ishai, Yang and Weiss (TCC 2016-A), and Hazay, Venkitasubramaniam and Weiss (ITC 2021)-in which the honest verifier makes a single round of queries to the proof. Both constructions use entirely different techniques compared to previous ZK-PCP constructions, by showing connections to the seemingly-unrelated notion of leakage resilience. These constructions are incomparable to previous ZK-PCP constructions: while on the one hand the honest verifier only makes a single round of queries to the proof, these ZK-PCPs either obtain a smaller (polynomial) ratio between the query complexity of the honest and malicious verifiers or obtain a weaker ZK guarantee in which the ZK simulator is not necessarily efficient.
引用
收藏
页数:44
相关论文
共 48 条
[1]   Distributed PCP Theorems for Hardness of Approximation in P [J].
Abboud, Amir ;
Rubinstein, Aviad ;
Williams, Ryan .
2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, :25-36
[2]  
[Anonymous], 2016, THESIS COMPUTER SCI
[3]  
Arora S., 1992, Proceedings 33rd Annual Symposium on Foundations of Computer Science (Cat. No.92CH3188-0), P2, DOI 10.1109/SFCS.1992.267824
[4]  
ARORA S, 1992, AN S FDN CO, P14
[5]   Non-Malleable Codes for Small-Depth Circuits [J].
Ball, Marshall ;
Dachman-Soled, Dana ;
Guo, Siyao ;
Malkin, Tal ;
Tan, Li-Yang .
2018 IEEE 59TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2018, :826-837
[6]   Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits [J].
Ball, Marshall ;
Dachman-Soled, Dana ;
Kulkarni, Mukul ;
Malkin, Tal .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :881-908
[7]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[8]  
Ben-Sasson E., 2004, P 36 ANN ACM S THEOR, P1
[9]  
Ben-Sasson E., 2016, ARXIV
[10]   Short PCPS with polylog query complexity [J].
Ben-Sasson, Eli ;
Sudan, Madhu .
SIAM JOURNAL ON COMPUTING, 2008, 38 (02) :551-607