Non-interactive Delegation and Batch NP Verification from Standard Computational Assumptions

被引:45
作者
Brakerski, Zvika [1 ]
Holmgren, Justin [2 ]
Kalai, Yael [3 ]
机构
[1] Weizmann Inst Sci, POB 26, IL-7610001 Rehovot, Israel
[2] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[3] Microsoft Res, 1 Mem Dr, Cambridge, MA 02142 USA
来源
STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING | 2017年
基金
以色列科学基金会;
关键词
Delegation of Computation; Computational No-Signaling; Probabilistically Checkable Proofs; Batch Arguments for NP; Private Information Retrieval; ARGUMENTS; PROOFS;
D O I
10.1145/3055399.3055497
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational PIR scheme, which in turn can be based on standard polynomial-time cryptographic assumptions (e.g. the worst case hardness of polynomial-factor approximation of short-vector lattice problems). In our protocol, the verifier sets up a public key ahead of time, and this key can be used by any prover to prove arbitrary statements by simply sending a proof to the verifier. Verification is done using a secret verification key, and soundness relies on this key not being known to the prover. Our protocol further allows to prove statements about computations of arbitrary RAM machines. Previous works either relied on knowledge assumptions, or could only off er non-adaptive two-message protocols (where the first message could not be re-used), and required either obfuscation-based assumptions or super-polynomial hardness assumptions. We show that our techniques can also be applied to construct a new type of (non-adaptive) 2-message argument for batch NP-statements. Specifically, we can simultaneously prove (with computational soundness) the membership of multiple instances in a given NP language, with communication complexity proportional to the length of a single witness.
引用
收藏
页码:474 / 482
页数:9
相关论文
共 38 条
[1]  
Aiello W, 2000, LECT NOTES COMPUT SC, V1853, P463
[2]  
Ananth P., 2015, IACR CRYPTOLOGY EPRI, V2015, P1082
[3]  
[Anonymous], 2012, ITCS, DOI 10.1145/ 2090236.2090263
[4]  
Applebaum B, 2010, LECT NOTES COMPUT SC, V6198, P152, DOI 10.1007/978-3-642-14165-2_14
[5]   Proof verification and the hardness of approximation problems [J].
Arora, S ;
Lund, C ;
Motwani, R ;
Sudan, M ;
Szegedy, M .
JOURNAL OF THE ACM, 1998, 45 (03) :501-555
[6]   Probabilistic checking of proofs: A new characterization of NP [J].
Arora, S ;
Safra, S .
JOURNAL OF THE ACM, 1998, 45 (01) :70-122
[7]   Universal arguments and their applications [J].
Barak, B ;
Goldreich, O .
17TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2002, :194-203
[8]  
Bitansky N., 2015, IACR CRYPTOLOGY EPRI, V2015, P356
[9]  
Bitansky N., 2014, IACR CRYPTOLOGY EPRI, V2014, P580
[10]  
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P111