Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience

被引:1
作者
Weiss, Mor [1 ]
机构
[1] Bar Ilan Univ, Alexander Kofkin Fac Engn, IL-5290002 Ramat Gan, Israel
关键词
Probabilistically Checkable Proofs; zero knowledge; leakage resilience; NON-MALLEABLE ENCRYPTION; BLACK-BOX CONSTRUCTION; CIRCUITS;
D O I
10.3390/e24070970
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Probabilistically Checkable Proofs (PCPs) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form "x is an element of L" by querying only a few proof bits. Zero-Knowledge PCPs (ZK-PCPs) enhance standard PCPs to additionally guarantee that the view of any (possibly malicious) verifier querying a bounded number of proof bits can be efficiently simulated up to a small statistical distance. The first ZK-PCP construction of Kilian, Petrank and Tardos (STOC 1997), and following constructions employing similar techniques, necessitate that the honest verifier makes several rounds of queries to the proof. This undesirable property, which is inherent to their technique, translates into increased round complexity in cryptographic applications of ZK-PCPs. We survey two recent ZK-PCP constructions-due to Ishai, Yang and Weiss (TCC 2016-A), and Hazay, Venkitasubramaniam and Weiss (ITC 2021)-in which the honest verifier makes a single round of queries to the proof. Both constructions use entirely different techniques compared to previous ZK-PCP constructions, by showing connections to the seemingly-unrelated notion of leakage resilience. These constructions are incomparable to previous ZK-PCP constructions: while on the one hand the honest verifier only makes a single round of queries to the proof, these ZK-PCPs either obtain a smaller (polynomial) ratio between the query complexity of the honest and malicious verifiers or obtain a weaker ZK guarantee in which the ZK simulator is not necessarily efficient.
引用
收藏
页数:44
相关论文
共 48 条
[31]  
Ishai Yuval, 2013, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. Algorithms and Techniques. 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013. Proceedings: LNCS 8096, P607, DOI 10.1007/978-3-642-40328-6_42
[32]   Private circuits: Securing hardware against probing attacks [J].
Ishai, Y ;
Sahai, A ;
Wagner, D .
ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 :463-481
[33]  
Ishai Y., 2015, IACR CRYPTOLOGY EPRI
[34]   Zero-Knowledge from Secure Multiparty Computation [J].
Ishai, Yuval ;
Kushilevitz, Eyal ;
Ostrovsky, Rafail ;
Sahai, Amit .
STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, :21-30
[35]   Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits [J].
Ishai, Yuval ;
Weiss, Mor ;
Yang, Guang .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :3-32
[36]  
Ishai Y, 2014, LECT NOTES COMPUT SC, V8349, P121, DOI 10.1007/978-3-642-54242-8_6
[37]  
Ishai Y, 2012, LECT NOTES COMPUT SC, V7194, P151, DOI 10.1007/978-3-642-28914-9_9
[38]  
Kilian J., 1992, Proceedings of the Twenty-Fourth Annual ACM Symposium on the Theory of Computing, P723, DOI 10.1145/129712.129782
[39]  
Kilian Joe., 1997, P 20 9 ANN ACM S THE, P496
[40]  
Lovett Shachar, 2011, Approximation, Randomization, and Combinatorial Optimization Algorithms and Techniques. Proceedings 14th International Workshop, APPROX 2011 and 15th International Workshop, RANDOM 2011, P640, DOI 10.1007/978-3-642-22935-0_54