Access the full text.
Sign up today, get DeepDyve free for 14 days.
Oded Goldreich (2001)
The Foundations of Cryptography - Volume 1: Basic Techniques
Virgo ZK reference implementation
Eli Ben-Sasson, Iddo Bentov, Y. Horesh, Michael Riabzev (2018)
Scalable, transparent, and post-quantum secure computational integrityIACR Cryptol. ePrint Arch., 2018
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, C. Petit (2016)
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log SettingIACR Cryptol. ePrint Arch., 2016
J. Thaler (2013)
Time-Optimal Interactive Proofs for Circuit EvaluationArXiv, abs/1304.3812
Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, D. Song (2019)
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf (2019)
DEEP-FRI: Sampling outside the box improves soundnessArXiv, abs/1903.12243
A. Vlasov, Konstantin Panarin (2019)
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication ComplexityIACR Cryptol. ePrint Arch., 2019
Benedikt Bünz, Ben Fisch, Alan Szepieniec (2020)
Transparent SNARKs from DARK Compilers
R. Wahby, Ye Ji, A. Blumberg, Abhi Shelat, J. Thaler, Michael Walfish, Thomas Wies (2017)
Full Accounting for Verifiable OutsourcingProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Eli Ben-Sasson, Iddo Bentov, Y. Horesh, Michael Riabzev (2017)
Fast Reed-Solomon Interactive Oracle Proofs of Proximity
Jens Groth, Y. Ishai (2008)
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle
Eli Ben-Sasson, A. Chiesa, Michael Riabzev, N. Spooner, M. Virza, N. Ward (2019)
Aurora: Transparent Succinct Arguments for R1CS
R. Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova (2013)
Quadratic Span Programs and Succinct NIZKs without PCPs
Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely (2021)
Proofs for Inner Pairing Products and Applications
Eli Ben-Sasson, A. Chiesa, Michael Forbes, Ariel Gabizon, Michael Riabzev, N. Spooner (2017)
Zero Knowledge Protocols from Succinct Constraint Detection
Paul Valiant (2008)
Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency
Graham Cormode, M. Mitzenmacher, J. Thaler (2011)
Practical verified computation with streaming interactive proofsArXiv, abs/1105.2003
Craig Gentry, D. Wichs (2011)
Separating succinct non-interactive arguments from all falsifiable assumptions
R. Merkle (1989)
A Certified Digital Signature
Rishabh Bhadauria, Zhiyong Fang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Tiancheng Xie, Yupeng Zhang (2020)
Ligero++: A New Optimized Sublinear IOPProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
Eli Ben-Sasson, A. Chiesa, Eran Tromer, M. Virza (2014)
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson, A. Chiesa, Ariel Gabizon, M. Virza (2016)
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPsElectron. Colloquium Comput. Complex., TR16
A. Fiat, A. Shamir (1986)
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
Eli Ben-Sasson, A. Chiesa, Daniel Genkin, Eran Tromer (2013)
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstractIACR Cryptol. ePrint Arch., 2012
Srinath Setty (2020)
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
R. Wahby, Ioanna Tzialla, Abhi Shelat, J. Thaler, Michael Walfish (2018)
Doubly-Efficient zkSNARKs Without Trusted Setup2018 IEEE Symposium on Security and Privacy (SP)
Common vulnerabilities and exposures
A. Shamir (1992)
IP = PSPACE
Eli Ben-Sasson, Dan Carmon, Y. Ishai, Swastik Kopparty, Shubhangi Saraf (2020)
Proximity Gaps for Reed–Solomon Codes2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)
Aniket Kate, Gregory Zaverucha, I. Goldberg (2010)
Constant-Size Commitments to Polynomials and Their Applications
A. Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, N. Ward (2020)
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRSIACR Cryptol. ePrint Arch., 2019
Matteo Campanelli, R. Gennaro, Steven Goldfeder, Luca Nizzardo (2017)
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for ServicesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Jens Groth (2016)
On the Size of Pairing-Based Non-interactive ArgumentsIACR Cryptol. ePrint Arch., 2016
A. Chiesa, D. Ojha, N. Spooner (2020)
Fractal: Post-Quantum and Transparent Recursive Proofs from HolographyIACR Cryptol. ePrint Arch., 2019
S. Micali (2000)
Computationally Sound ProofsSIAM J. Comput., 30
(1997)
Finite Fields. Second Edition
Jonathan Lee (2020)
Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
A. Chiesa, Michael Forbes, N. Spooner (2017)
A Zero Knowledge Sumcheck and its ApplicationsElectron. Colloquium Comput. Complex., TR17
S. Goldwasser, S. Micali, C. Rackoff (1989)
The Knowledge Complexity of Interactive Proof Systems
Benedikt Bünz, Jonathan Bootle, D. Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell (2018)
Bulletproofs: Short Proofs for Confidential Transactions and More2018 IEEE Symposium on Security and Privacy (SP)
N. Byott, R. Chapman (1999)
Power Sums over Finite Subspaces of a FieldFinite Fields and Their Applications, 5
Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, D. Song (2020)
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof2020 IEEE Symposium on Security and Privacy (SP)
S. Goldwasser, Y. Kalai, G. Rothblum (2008)
Delegating computation: interactive proofs for mugglesProceedings of the fortieth annual ACM symposium on Theory of computing
Eli Ben-Sasson, A. Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, N. Spooner (2019)
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson, A. Chiesa, Christina Garman, M. Green, Ian Miers, Eran Tromer, M. Virza (2014)
Zerocash: Decentralized Anonymous Payments from Bitcoin2014 IEEE Symposium on Security and Privacy
J. Kilian (1992)
A note on efficient zero-knowledge proofs and arguments (extended abstract)
Scott Ames, Carmit Hazay, Y. Ishai, Muthuramakrishnan Venkitasubramaniam (2017)
Ligero: Lightweight Sublinear Arguments Without a Trusted SetupProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
C. Lund, L. Fortnow, H. Karloff, N. Nisan (1990)
Algebraic methods for interactive proof systemsProceedings [1990] 31st Annual Symposium on Foundations of Computer Science
Eli Ben-Sasson, A. Chiesa, N. Spooner (2016)
Interactive Oracle Proofs
A. Condon, R. Lipton (1989)
On the complexity of space bounded interactive proofs30th Annual Symposium on Foundations of Computer Science
AbstractWe present a new zero-knowledge succinct argument of knowledge (zkSNARK) scheme for Rank-1 Constraint Satisfaction (RICS), a widely deployed NP-complete language that generalizes arithmetic circuit satisfiability. By instantiating with different commitment schemes, we obtain several zkSNARKs where the verifier’s costs and the proof size range from O(log2 N) to O(N)O\left( {\sqrt N } \right)depending on the underlying polynomial commitment schemes when applied to an N-gate arithmetic circuit. All these schemes do not require a trusted setup. It is plausibly post-quantum secure when instantiated with a secure collision-resistant hash function. We report on experiments for evaluating the performance of our proposed system. For instance, for verifying a SHA-256 preimage (less than 23k AND gates) in zero-knowledge with 128 bits security, the proof size is less than 150kB and the verification time is less than 11ms, both competitive to existing systems.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Jan 1, 2022
Keywords: zkSNARK; verifiable computation; zero-knowledge proof; polynomial commitment
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.