Amortized efficient zk-SNARK from linear-only RLWE encodings
نویسندگان
چکیده
This paper addresses a new lattice-based designated zk-SNARK having the smallest proof size in amortized sense, from linear-only ring learning with error (RLWE) encodings. We first generalize quadratic arithmetic programming (QAP) over finite field to ring-variant polynomial Z p [X]/(X N + 1) power of two N. Then, we propose this encoding assumption on RLWE From isomorphism +1)≅Z , proposed scheme packs multiple messages resulting much smaller compared previous works. In addition, present refined analysis noise flooding technique based Hellinger divergence instead conventional statistical distance, which reduces proof. particular, our is 276.5 KB and only 156 bytes since protocol allows batch N proofs into single Therefore, achieve category zk-SNARKs comparable (pre-quantum) category.
منابع مشابه
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Recent efficient constructions of zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk-SNARKs), require a setup phase in which a common-reference string (CRS) with a certain structure is generated. This CRS is sometimes referred to as the public parameters of the system, and is used for constructing and verifying proofs. A drawback of these constructions is that whomever runs the ...
متن کاملScalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuable tool for verifiable computation and privacy preserving protocols. Currently practical schemes require a common reference string (CRS) to be constructed in a one-time setup for each statement. Ben-Sasson, Chiesa, Green, Tromer and Virza [5] devised a multi-party protocol to securely compute such...
متن کاملPublic-Key Encryption with Efficient Amortized Updates
Searching and modifying public-key encrypted data has received a lot of attention in recent literature. In this paper we re-visit this important topic and achieve improved amortized bounds including resolving a prominent open question posed by Boneh et al. [3]. First, we consider the following much simpler to state problem: A server holds a copy of Alice’s database that has been encrypted under...
متن کاملLinear Encodings of Linguistic Analyses
1. (1) is of course highly unnatural in a sense. However, it effectively isolates for study a phenomenon that is intrinsic to natural language. Similar observations apply to the examples below. 2. It is of course also the case that an exponentially long answer caunot be produced in polynomial time. If the problem cannot be reformulated so that answers are not exponentially long, the question of...
متن کاملAttacks on Search RLWE
We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on the chi-square statistical test, and give examples of RLWE instances in Galois number fields which are vulnerable to our attack. We prove a search-to-decision reduction for Galois fields which applies for any unramified prime modulus q, regardless of the residue degree f of q, and we use this in our attacks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Communications and Networks
سال: 2023
ISSN: ['1976-5541', '1229-2370']
DOI: https://doi.org/10.23919/jcn.2023.000012