skip to main content
Primo Search
Search in: Busca Geral

Shorter ZK-SNARKs from square span programs over ideal lattices

Lin, Xi ; Cao, Heyang ; Liu, Feng-Hao ; Wang, Zhedong ; Wang, Mingsheng

Cybersecurity, 2024-12, Vol.7 (1), p.33-19, Article 33 [Periódico revisado por pares]

Singapore: Springer Nature Singapore

Texto completo disponível

Citações Citado por
  • Título:
    Shorter ZK-SNARKs from square span programs over ideal lattices
  • Autor: Lin, Xi ; Cao, Heyang ; Liu, Feng-Hao ; Wang, Zhedong ; Wang, Mingsheng
  • Assuntos: Computer Applications ; Computer engineering ; Computer Science ; Cryptography ; Cybercrime ; Cybersecurity ; Design ; Efficiency ; Knowledge ; Lattices ; Post-quantum ; Privacy ; Security ; Succinct argument ; Switching ; Zk-SNARKs
  • É parte de: Cybersecurity, 2024-12, Vol.7 (1), p.33-19, Article 33
  • Descrição: Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn considerable attention for their appealing applications, e.g., verifiable computation and anonymous payment protocol. Compared with the pre-quantum case, the practicability of this primitive in the post-quantum setting is still unsatisfactory, especially for the space complexity. To tackle this issue, this work seeks to enhance the efficiency and compactness of lattice-based zk-SNARKs, including proof length and common reference string (CRS) length. In this paper, we develop the framework of square span program-based SNARKs and design new zk-SNARKs over cyclotomic rings. Compared with previous works, our construction is without parallel repetition and achieves shorter proof and CRS lengths than previous lattice-based zk-SNARK schemes. Particularly, the proof length of our scheme is around 23.3 % smaller than the recent shortest lattice-based zk-SNARKs by Ishai et al. (in: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 212–234, 2021), and the CRS length is 3.6 × smaller. Our constructions follow the framework of Gennaro et al. (in: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 556–573, 2018), and adapt it to the ring setting by slightly modifying the knowledge assumptions. We develop concretely small constructions by using module-switching and key-switching procedures in a novel way.
  • Editor: Singapore: Springer Nature Singapore
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.