Amortization with Fewer Equations for Proving Knowledge of Small Secrets
نویسندگان
چکیده
For a linear function f , a vector x with small coefficients, and a vector y = f(x), we would like to be able to give a zero-knowledge proof for the knowledge of an x′ with small coefficients that satisfies f(x′) = y. This is a common scenario in lattice-based cryptography, and there is currently no satisfactory solution for this problem. All known protocols are built via the repetition of a basic protocol that only has constant (1/2 or 2/3) soundness error. This implies that the communication complexity of the final protocol will be at least a factor of k larger than that of the basic one, where k is the security parameter. One can do better if one considers simultaneously proving the knowledge of many instances of the above linear equation. The protocol that has the smallest amortized communication complexity while achieving close-to-optimal slack (i.e. the ratio between the coefficients in the secret and those that can be extracted from the proof) is due to Cramer et al. (Eurocrypt ’17) which builds on an earlier work of Baum et al. (Crypto ’16). The main downside of this protocol is that the amortization only kicks in when the number of equations is rather large – 4k. This means that for k = 128, it is only truly optimal when one has more than 2 equations to prove. The aforementioned work of Cramer et al. also shows how to achieve a protocol requiring o(k) samples, but it is only applicable for much larger values of k. The main result of our work is reducing the concrete minimal number of equations required for the amortization, while keeping the communication complexity almost unchanged. The cost of this is an increase in the running time of the zero-knowledge proof. More specifically, we show that one can decrease the required number of equations by a factor of Ω(log α) at the cost of increasing the running time by a factor of Ω(α). For example, increasing the running time by a factor of 8 allows us to decrease the required number of samples from 69000 to 4500 – a factor of 15. As a side benefit, the slack of our protocol decreases by a factor of logα as well. We also show that in the case that f is a function over the polynomial ring Z[X]/(X + 1) and we would like to give a proof of knowledge of an x′ with small coefficients such that f(x′) = 2y, then the number of samples needed for amortization is even lower. Without any trade-offs in the running time, our algorithm requires around 2200 samples, and for the same factor 8 increase in the running time, the requirement goes down to 850.
منابع مشابه
Sharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode
In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...
متن کاملConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
In the conditional disclosure of secrets problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs x and y respectively, wish to release a common secret s to Carol (who knows both x and y) if only if the input (x, y) satisfies some predefined predicate f . Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some joint rando...
متن کاملNew Protocols for Proving Knowledge of Arbitrary Secrets While not Giving Them Away
This paper introduces and describes new protocols for proving knowledge of secrets without giving them away: if the verifier does not know the secret, he does not learn it. Three role configurations exist for this type of protocols: (1) the prover may want to pro-actively prove knowledge of a secret, (2) a verifier may ask someone to prove knowledge of a secret, or (3) two players may mutually ...
متن کاملProving Possession of Arbitrary Secrets While not Giving them Away: New Protocols and a Proof in GNY Logic
This paper introduces and describes new protocols for proving knowledge of secrets without giving them away: if the verifier does not know the secret, he does not learn it. This can all be done while only using one-way hash functions. If also the use of encryption is allowed, these goals can be reached in a more efficient way. We extend and use the GNY authentication logic to prove correctness ...
متن کاملCommitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
We construct a perfectly binding string commitment scheme whose security is based on the learning parity with noise (LPN) assumption, or equivalently, the hardness of decoding random linear codes. Our scheme not only allows for a simple and efficient zero-knowledge proof of knowledge for committed values (essentially a Σ-protocol), but also for such proofs showing any kind of relation amongst c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017