On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations

نویسندگان

  • Ronald Cramer
  • Ivan Damgård
  • Valerio Pastro
چکیده

We present a protocol that allows to prove in zero-knowledge that committed values xi, yi, zi, i = 1, . . . , l satisfy xiyi = zi, where the values are taken from a finite field. For error probability 2−u the size of the proof is linear in u and only logarithmic in l. Therefore, for any fixed error probability, the amortized complexity vanishes as we increase l. In particular, when the committed values are from a field of small constant size, we improve complexity of previous solutions by a factor of l. Assuming preprocessing, we can make the commitments (and hence the protocol itself) be information theoretically secure. Using this type of commitments we obtain, in the preprocessing model, a perfect zero-knowledge interactive proof for circuit satisfiability of circuit C where the proof has size O(|C|). We then generalize our basic scheme to a protocol that verifies l instances of an algebraic circuit D over K with v inputs, in the following sense: given committed values xi,j and zi, with i = 1, . . . , l and j = 1, . . . , v, the prover shows that D(xi,1, . . . , xi,v) = zi for i = 1, . . . , l. The interesting property is that the amortized complexity of verifying one circuit only depends on the multiplicative depth of the circuit and not the size. So for circuits with small multiplicative depth, the amortized cost can be asymptotically smaller than the number of multiplications in D. Finally we look at commitments to integers, and we show how to implement information theoretically secure homomorphic commitments to integer values, based on preprocessing. After preprocessing, they require only a constant number of multiplications per commitment. We also show a variant of our basic protocol, which can verify l integer multiplications with low amortized complexity. This protocol also works for standard computationally secure commitments and in this case we improve on security: whereas previous solutions with similar efficiency require the strong RSA assumption, we only need the assumption required by the commitment scheme itself, namely factoring.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The number of boolean functions with multiplicative complexity 2

Multiplicative complexity is a complexity measure defined as the minimum number of AND gates required to implement a given primitive by a circuit over the basis (AND, XOR, NOT). Implementations of ciphers with a small number of AND gates are preferred in protocols for fully homomorphic encryption, multi-party computation and zero-knowledge proofs. In 2002, Fischer and Peralta [12] showed that t...

متن کامل

Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings

For a public value y and a linear function f , giving a zero-knowledge proof of knowledge of a secret value x that satisfies f(x) = y is a key ingredient in many cryptographic protocols. Lattice-based constructions, in addition, require proofs of “shortness” of x. Of particular interest are constructions where f is a function over polynomial rings, since these are the ones that result in effici...

متن کامل

Compact VSS and Efficient Homomorphic UC Commitments

We present a new compact verifiable secret sharing scheme, based on this we present the first construction of a homomorphic UC commitment scheme that requires only cheap symmetric cryptography, except for a small number of seed OTs. To commit to a k-bit string, the amortized communication cost is O(k) bits. Assuming a sufficiently efficient pseudorandom generator, the computational complexity i...

متن کامل

Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings

We design an efficient commitment scheme, and companion zero-knowledge proofs of knowledge, based on the learning with errors over rings (RLWE) problem. In particular, for rings in which almost all elements have inverses, we construct a perfectly binding commitment scheme whose hiding property relies on the RLWE assumption. Our scheme maps elements from the ring (or equivalently, n elements fro...

متن کامل

Better Preprocessing for Secure Multiparty Computation

We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme and its derivatives. These MPC schemes consist of a so-called preprocessing or offline phase, where correlated randomness is generated that is independent of the inputs and the evaluated function, and an online phase, where such correlated randomness is con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011