Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval - - PowerPoint PPT Presentation

โ–ถ
lin inear multi prover in interactive proofs
SMART_READER_LITE
LIVE PREVIEW

Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval - - PowerPoint PPT Presentation

Quasi-Optimal SNARGs via ia Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu Non-Interactive Arguments for NP = , = 1 for some (, )


slide-1
SLIDE 1

Quasi-Optimal SNARGs via ia Lin inear Multi-Prover In Interactive Proofs

Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu

slide-2
SLIDE 2

Non-Interactive Arguments for NP

โ„’๐ท = ๐‘ฆ โˆถ ๐ท ๐‘ฆ, ๐‘ฅ = 1 for some ๐‘ฅ

๐‘„(๐‘ฆ, ๐‘ฅ) ๐‘Š(๐‘ฆ) accept / reject Completeness: ๐ท ๐‘ฆ, ๐‘ฅ = 1 โŸน Pr ๐‘„ ๐‘ฆ, ๐‘ฅ , ๐‘Š ๐‘ฆ = 1 = 1 Soundness: for all provers ๐‘„โ‹† of size 2๐œ‡ (๐œ‡ is a security parameter): ๐‘ฆ โˆ‰ โ„’๐ท โŸน Pr ๐‘„โ‹† ๐‘ฆ , ๐‘Š ๐‘ฆ = 1 โ‰ค 2โˆ’๐œ‡

๐œŒ

slide-3
SLIDE 3

Succinct Non-Interactive Arguments (SNARGs)

๐‘„(๐‘ฆ, ๐‘ฅ) ๐‘Š(๐‘ฆ) accept / reject Argument system is succinct if:

  • Prover communication is poly ๐œ‡ + log ๐ท
  • ๐‘Š can be implemented by a circuit of size poly ๐œ‡ + ๐‘ฆ + log ๐ท

Verifier complexity significantly smaller than classic NP verifier

โ„’๐ท = ๐‘ฆ โˆถ ๐ท ๐‘ฆ, ๐‘ฅ = 1 for some ๐‘ฅ ๐œŒ

slide-4
SLIDE 4

Succinct Non-Interactive Arguments (SNARGs)

๐‘„(๐‘ฆ, ๐‘ฅ) ๐‘Š(๐‘ฆ) accept / reject

๐œŒ

Argument consists of a single message Instantiation: โ€œCS proofsโ€ in the random oracle model [Mic94]

slide-5
SLIDE 5

Succinct Non-Interactive Arguments (SNARGs)

๐‘„(๐œ, ๐‘ฆ, ๐‘ฅ) ๐‘Š(๐œ, ๐‘ฆ) accept / reject

๐œŒ

Argument consists of a single message

common reference string (CRS) verification state

Setup 1๐œ‡

๐œ ๐œ

Can consider publicly- verifiable and secretly- verifiable SNARGs Preprocessing SNARGs: allow โ€œexpensiveโ€ setup

slide-6
SLIDE 6

Complexity Metrics for SNARGs

Soundness: for all provers ๐‘„โ‹† of size 2๐œ‡: ๐‘ฆ โˆ‰ โ„’๐ท โŸน Pr ๐‘„โ‹† ๐‘ฆ , ๐‘Š ๐‘ฆ = 1 โ‰ค 2โˆ’๐œ‡

How short can the proofs be? ๐œŒ = ฮฉ ๐œ‡ How much work is needed to generate the proof? ๐‘„ = ฮฉ ๐ท

Even in the designated- verifier setting

[See paper for details]

slide-7
SLIDE 7

Quasi-Optimal SNARGs

Soundness: for all provers ๐‘„โ‹† of size 2๐œ‡: ๐‘ฆ โˆ‰ โ„’๐ท โŸน Pr ๐‘„โ‹† ๐‘ฆ , ๐‘Š ๐‘ฆ = 1 โ‰ค 2โˆ’๐œ‡

A SNARG (for Boolean circuit satisfiability) is quasi-optimal if it satisfies the following properties:

  • Quasi-optimal succinctness:

๐œŒ = ๐œ‡ โ‹… polylog ๐œ‡, ๐ท = เทจ ๐‘ƒ(๐œ‡)

  • Quasi-optimal prover complexity:

๐‘„ = เทจ ๐‘ƒ ๐ท + poly(๐œ‡, log ๐ท )

slide-8
SLIDE 8

Quasi-Optimal SNARGs

Construction Prover Complexity Proof Size Assumption

CS Proofs [Mic94]

เทจ ๐‘ƒ( ๐ท ) เทจ ๐‘ƒ(๐œ‡2) Random Oracle

Groth [Gro10] GGPR [GGPR12]

เทจ ๐‘ƒ(๐œ‡ ๐ท 2 + ๐ท ๐œ‡2) เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) เทจ ๐‘ƒ(๐œ‡) Knowledge of Exponent

BCIOP (Pairing) [BCIOP13]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Encryption

BISW (LWE/RLWE) [BISW17]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Vector Encryption

Groth [Gro16]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Generic Group

slide-9
SLIDE 9

Quasi-Optimal SNARGs

Construction Prover Complexity Proof Size Assumption

CS Proofs [Mic94]

เทจ ๐‘ƒ( ๐ท ) เทจ ๐‘ƒ(๐œ‡2) Random Oracle

Groth [Gro10] GGPR [GGPR12]

เทจ ๐‘ƒ(๐œ‡ ๐ท 2 + ๐ท ๐œ‡2) เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) เทจ ๐‘ƒ(๐œ‡) Knowledge of Exponent

BCIOP (Pairing) [BCIOP13]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Encryption

BISW (LWE/RLWE) [BISW17]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Vector Encryption

Groth [Gro16]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Generic Group

For simplicity, we ignore low order terms poly ๐œ‡, log ๐ท

slide-10
SLIDE 10

Quasi-Optimal SNARGs

Construction Prover Complexity Proof Size Assumption

CS Proofs [Mic94]

เทจ ๐‘ƒ( ๐ท ) เทจ ๐‘ƒ(๐œ‡2) Random Oracle

Groth [Gro10] GGPR [GGPR12]

เทจ ๐‘ƒ(๐œ‡ ๐ท 2 + ๐ท ๐œ‡2) เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) เทจ ๐‘ƒ(๐œ‡) Knowledge of Exponent

BCIOP (Pairing) [BCIOP13]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Encryption

BISW (LWE/RLWE) [BISW17]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Linear-Only Vector Encryption

Groth [Gro16]

เทจ ๐‘ƒ(๐œ‡ ๐ท ) เทจ ๐‘ƒ(๐œ‡) Generic Group

This work

เทจ ๐‘ƒ ๐ท เทจ ๐‘ƒ(๐œ‡) Linear-Only Vector Encryption

For simplicity, we ignore low order terms poly ๐œ‡, log ๐ท

slide-11
SLIDE 11

This Work

New framework for building preprocessing SNARGs (following [BCIOP13, BISW17])

Step 1 (information-theoretic):

  • Linear multi-prover interactive proofs (linear MIPs)
  • This work: first construction of a quasi-optimal linear MIP

Step 2 (cryptographic):

  • Linear-only vector encryption to simulate linear MIP model
  • This work: linear MIP โŸน preprocessing SNARG

Results yield the first quasi-optimal SNARG (from linear-only vector encryption

  • ver rings)
slide-12
SLIDE 12

Linear PCPs [IKO07]

๐œŒ โˆˆ ๐”พ๐‘›

๐‘Ÿ โˆˆ ๐”พ๐‘› ๐‘Ÿ, ๐œŒ โˆˆ ๐”พ Several possible instantiations: based on the Walsh-Hadamard code [ALMSS92] or quadratic span programs [GGPR13] Verifier

๐‘ฆ, ๐‘ฅ

PCP where the proof

  • racle implements a

linear function ๐œŒ โˆˆ ๐”พ๐‘› In these instantiations, verifier is oblivious (queries independent of statement)

slide-13
SLIDE 13

From Linear PCPs to SNARGs [BCIOP13]

๐‘Ÿ1 ๐‘Ÿ2 ๐‘Ÿ3 ๐‘Ÿ๐‘™ โ‹ฏ

part of the CRS

๐‘… =

Verifier encrypts its queries using a linear-only encryption scheme

slide-14
SLIDE 14

From Linear PCPs to SNARGs [BCIOP13]

๐‘Ÿ1 ๐‘Ÿ2 ๐‘Ÿ3 ๐‘Ÿ๐‘™ โ‹ฏ

part of the CRS

๐‘… =

Verifier encrypts its queries using a linear-only encryption scheme

Encryption scheme that only supports linear homomorphism

slide-15
SLIDE 15

From Linear PCPs to SNARGs [BCIOP13]

๐‘Ÿ1 ๐‘Ÿ2 ๐‘Ÿ3 ๐‘Ÿ๐‘™ โ‹ฏ

part of the CRS

๐‘… =

Verifier encrypts its queries using a linear-only encryption scheme

๐‘ฆ, ๐‘ฅ ๐œŒ โˆˆ ๐”พ๐‘›

Prover constructs linear PCP ๐œŒ from (๐‘ฆ, ๐‘ฅ)

โŸจ๐œŒ, ๐‘Ÿ1โŸฉ โŸจ๐œŒ, ๐‘Ÿ2โŸฉ โ‹ฏ โŸจ๐œŒ, ๐‘Ÿ๐‘™โŸฉ

Prover homomorphically computes responses to linear PCP queries SNARG proof

slide-16
SLIDE 16

From Linear PCPs to SNARGs [BCIOP13]

๐‘Ÿ1 ๐‘Ÿ2 ๐‘Ÿ3 ๐‘Ÿ๐‘™ โ‹ฏ

part of the CRS

๐‘… =

Verifier encrypts its queries using a linear-only encryption scheme

๐‘ฆ, ๐‘ฅ ๐œŒ โˆˆ ๐”พ๐‘›

Prover constructs linear PCP ๐œŒ from (๐‘ฆ, ๐‘ฅ)

โŸจ๐œŒ, ๐‘Ÿ1โŸฉ โŸจ๐œŒ, ๐‘Ÿ2โŸฉ โ‹ฏ โŸจ๐œŒ, ๐‘Ÿ๐‘™โŸฉ

Prover homomorphically computes responses to linear PCP queries SNARG proof

Evaluating inner product requires ฮฉ ๐ท homomorphic operations; prover complexity: ฮฉ ๐œ‡ โ‹… ฮฉ ๐ท = ฮฉ ๐œ‡ ๐ท Proof consists of a constant number of ciphertexts: total length ๐‘ƒ(๐œ‡) bits

We pay ฮฉ(๐œ‡) for each homomorphic

  • peration. Can we

reduce this?

slide-17
SLIDE 17

Linear-Only Encryption over Rings

Consider encryption scheme over a polynomial ring ๐‘†๐‘ž = ฮค โ„ค๐‘ž ๐‘ฆ ฮฆโ„“ ๐‘ฆ โ‰… ๐”พ๐‘ž

โ„“

๐‘ฆ1 ๐‘ฆ2 ๐‘ฆ3 โ‹ฎ ๐‘ฆโ„“

Plaintext space can be viewed as a vector of field elements

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฎ ๐‘ฆโ„“

โ€ฒ

๐‘ฆ1 + ๐‘ฆ1โ€ฒ ๐‘ฆ2 + ๐‘ฆ2

โ€ฒ

๐‘ฆ3 + ๐‘ฆ3

โ€ฒ

โ‹ฎ ๐‘ฆโ„“ + ๐‘ฆโ„“

โ€ฒ

Homomorphic operations correspond to component-wise additions and scalar multiplications Using RLWE-based encryption schemes, can encrypt โ„“ = เทจ ๐‘ƒ(๐œ‡) field elements (๐‘ž = poly ๐œ‡ ) with ciphertexts of size เทจ ๐‘ƒ(๐œ‡)

slide-18
SLIDE 18

Linear-Only Encryption over Rings

Consider encryption scheme over a polynomial ring ๐‘†๐‘ž = ฮค โ„ค๐‘ž ๐‘ฆ ฮฆโ„“ ๐‘ฆ โ‰… ๐”พ๐‘ž

โ„“

๐‘ฆ1 ๐‘ฆ2 ๐‘ฆ3 โ‹ฎ ๐‘ฆโ„“

Plaintext space can be viewed as a vector of field elements

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฎ ๐‘ฆโ„“

โ€ฒ

๐‘ฆ1 + ๐‘ฆ1โ€ฒ ๐‘ฆ2 + ๐‘ฆ2

โ€ฒ

๐‘ฆ3 + ๐‘ฆ3

โ€ฒ

โ‹ฎ ๐‘ฆโ„“ + ๐‘ฆโ„“

โ€ฒ

Homomorphic operations correspond to component-wise additions and scalar multiplications Using RLWE-based encryption schemes, can encrypt โ„“ = เทจ ๐‘ƒ(๐œ‡) field elements (๐‘ž = poly ๐œ‡ ) with ciphertexts of size เทจ ๐‘ƒ(๐œ‡)

Amortized cost of homomorphic

  • peration on a single field

element is polylog(๐œ‡)

slide-19
SLIDE 19

Linear-Only Encryption over Rings

๐‘Ÿ1 โˆˆ ๐”พ๐‘ž

๐‘›

๐‘Ÿ2 โˆˆ ๐”พ๐‘ž

๐‘›

๐‘Ÿ3 โˆˆ ๐”พ๐‘ž

๐‘›

โ‹ฎ ๐‘Ÿโ„“ โˆˆ ๐”พ๐‘ž

๐‘›

โŸจ๐œŒ1, ๐‘Ÿ1โŸฉ โŸจ๐œŒ2, ๐‘Ÿ2โŸฉ โŸจ๐œŒ3, ๐‘Ÿ3โŸฉ โ‹ฎ โŸจ๐œŒโ„“, ๐‘Ÿโ„“โŸฉ Given encrypted set of query vectors, prover can homomorphically apply independent linear functions to each slot

slide-20
SLIDE 20

Linear Multi-Prover Interactive Proofs (MIPs)

๐‘ฆ, ๐‘ฅ

๐œŒ1 ๐œŒ2 โ‹ฏ ๐œŒโ„“ Verifier has oracle access to multiple linear proof oracles

[Proofs may be correlated]

Can convert linear MIP to preprocessing SNARG using linear-

  • nly (vector) encryption over rings
slide-21
SLIDE 21

Suppose

  • Number of provers โ„“ = เทจ

๐‘ƒ ๐œ‡

  • Proofs ๐œŒ1, โ€ฆ , ๐œŒโ„“ โˆˆ ๐”พ๐‘ž

๐‘› where ๐‘› =

ฮค ๐ท โ„“

  • Number of queries to each ๐œŒ๐‘— is polylog(๐œ‡)

Then, linear MIP is quasi-optimal

Linear Multi-Prover Interactive Proofs (MIPs)

๐‘ฆ, ๐‘ฅ

๐œŒ1 ๐œŒ2 โ‹ฏ ๐œŒโ„“

slide-22
SLIDE 22

Suppose

  • Number of provers โ„“ = เทจ

๐‘ƒ ๐œ‡

  • Proofs ๐œŒ1, โ€ฆ , ๐œŒโ„“ โˆˆ ๐”พ๐‘ž

๐‘› where ๐‘› =

ฮค ๐ท โ„“

  • Number of queries to each ๐œŒ๐‘— is polylog(๐œ‡)

Then, linear MIP is quasi-optimal

Linear Multi-Prover Interactive Proofs (MIPs)

๐‘ฆ, ๐‘ฅ

๐œŒ1 ๐œŒ2 โ‹ฏ ๐œŒโ„“

Prover complexity: เทจ ๐‘ƒ โ„“๐‘› = เทจ ๐‘ƒ ๐ท Linear MIP size: ๐‘ƒ โ„“ โ‹… polylog ๐œ‡ = เทจ ๐‘ƒ(๐œ‡)

slide-23
SLIDE 23

Quasi-Optimal Linear MIPs

This work: Construction of a quasi-optimal linear MIP for Boolean circuit satisfiability

Robust Decomposition Consistency Check Quasi-Optimal Linear MIP

slide-24
SLIDE 24

Robust Decomposition

(๐‘ฆ, ๐‘ฅ)

Encode

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฏ ๐‘ฆ๐‘œ

โ€ฒ

๐‘ฅ1

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ3

โ€ฒ

โ‹ฏ ๐‘ฅโ„Ž

โ€ฒ

๐‘”

1

๐‘”

2

โ‹ฏ

Boolean circuit ๐ท of size ๐‘ก

๐‘”

โ„“ Statement- witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Decompose ๐ท into constraint functions ๐‘”

1, โ€ฆ , ๐‘” โ„“, where each

constraint can be computed by a circuit of size ๐‘ก/โ„“

Only depends on ๐‘ฆ

Each constraint only needs to read a subset of the input bits

slide-25
SLIDE 25

Robust Decomposition

(๐‘ฆ, ๐‘ฅ)

Encode

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฏ ๐‘ฆ๐‘œ

โ€ฒ

๐‘ฅ1

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ3

โ€ฒ

โ‹ฏ ๐‘ฅโ„Ž

โ€ฒ

๐‘”

1

๐‘”

2

โ‹ฏ

Boolean circuit ๐ท of size ๐‘ก

๐‘”

โ„“ Statement- witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Only depends on ๐‘ฆ

Decompose ๐ท into constraint functions ๐‘”

1, โ€ฆ , ๐‘” โ„“, where each

constraint can be computed by a circuit of size ๐‘ก/โ„“ Each constraint only needs to read a subset of the input bits

slide-26
SLIDE 26

Robust Decomposition

(๐‘ฆ, ๐‘ฅ)

Encode

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฏ ๐‘ฆ๐‘œ

โ€ฒ

๐‘ฅ1

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ3

โ€ฒ

โ‹ฏ ๐‘ฅโ„Ž

โ€ฒ

๐‘”

1

๐‘”

2

โ‹ฏ

Boolean circuit ๐ท of size ๐‘ก

๐‘”

โ„“ Statement- witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Only depends on ๐‘ฆ

Decompose ๐ท into constraint functions ๐‘”

1, โ€ฆ , ๐‘” โ„“, where each

constraint can be computed by a circuit of size ๐‘ก/โ„“ Each constraint only needs to read a subset of the input bits

slide-27
SLIDE 27

Robust Decomposition

(๐‘ฆ, ๐‘ฅ)

Encode

๐‘ฆ1

โ€ฒ

๐‘ฆ2

โ€ฒ

๐‘ฆ3

โ€ฒ

โ‹ฏ ๐‘ฆ๐‘œ

โ€ฒ

๐‘ฅ1

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ3

โ€ฒ

โ‹ฏ ๐‘ฅโ„Ž

โ€ฒ

๐‘”

1

๐‘”

2

โ‹ฏ

Boolean circuit ๐ท of size ๐‘ก

๐‘”

โ„“ Statement- witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Completeness: If ๐ท ๐‘ฆ, ๐‘ฅ = 1, then ๐‘”

๐‘— ๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ = 1 for all ๐‘—

Robustness: If ๐‘ฆ โˆ‰ โ„’, then for all ๐‘ฅโ€ฒ, at most 2/3 of ๐‘”

๐‘— ๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ = 1

Efficiency: (๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ) can be computed by a circuit of size เทจ ๐‘ƒ(๐‘ก)

Only depends on ๐‘ฆ

slide-28
SLIDE 28

Robust Decomposition

Boolean circuit ๐ท of size ๐‘ก ๐‘”

1

๐‘”

2

โ‹ฎ ๐‘”

โ„“

๐œŒ1 ๐œŒ2 โ‹ฎ ๐œŒโ„“

๐œŒ๐‘—: linear PCP that ๐‘”

๐‘—(๐‘ฆโ€ฒ,โ‹…) is satisfiable

(instantiated over ๐”พ๐‘ž where ๐‘ž = poly(๐œ‡))

Using linear PCP based on QSPs [GGPR13], ๐œŒ๐‘— = ๐‘ƒ( ฮค ๐ท โ„“) and provides soundness 1/poly ๐œ‡ (๐‘ฆ, ๐‘ฅ)

Statement-witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Encode

(๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ)

slide-29
SLIDE 29

Robust Decomposition

Boolean circuit ๐ท of size ๐‘ก ๐‘”

1

๐‘”

2

โ‹ฎ ๐‘”

โ„“

๐œŒ1 ๐œŒ2 โ‹ฎ ๐œŒโ„“

๐œŒ๐‘—: linear PCP that ๐‘”

๐‘—(๐‘ฆโ€ฒ,โ‹…) is satisfiable

(instantiated over ๐”พ๐‘ž where ๐‘ž = poly(๐œ‡))

Verifier invokes linear PCP verifier for each instance (๐‘ฆ, ๐‘ฅ)

Statement-witness for ๐ท Statement-witness for ๐‘”

1, โ€ฆ , ๐‘” โ„“

Encode

(๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ)

slide-30
SLIDE 30

Robust Decomposition

Boolean circuit ๐ท of size ๐‘ก ๐‘”

1

๐‘”

2

โ‹ฎ ๐‘”

โ„“

๐œŒ1 ๐œŒ2 โ‹ฎ ๐œŒโ„“

๐œŒ๐‘—: linear PCP that ๐‘”

๐‘—(๐‘ฆโ€ฒ,โ‹…) is satisfiable

(instantiated over ๐”พ๐‘ž where ๐‘ž = poly(๐œ‡)) Completeness: Follows by completeness of decomposition and linear PCPs Soundness: Each linear PCP provides ฮค 1 poly ๐œ‡ soundness and for false statement, at least 1/3 of the statements are false, so if โ„“ = ฮฉ(๐œ‡), verifier accepts with probability 2โˆ’ฮฉ ๐œ‡

slide-31
SLIDE 31

Robust Decomposition

Completeness: Follows by completeness of decomposition and linear PCPs Soundness: Each linear PCP provides ฮค 1 poly ๐œ‡ soundness and for false statement, at least 1/3 of the statements are false, so if โ„“ = ฮฉ(๐œ‡), verifier accepts with probability 2โˆ’ฮฉ ๐œ‡

Robustness: If ๐‘ฆ โˆ‰ โ„’, then for all ๐‘ฅโ€ฒ, at most 2/3 of ๐‘”

๐‘— ๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ = 1

For false ๐‘ฆ, no single ๐‘ฅโ€ฒ can simultaneously satisfy ๐‘”

๐‘— ๐‘ฆโ€ฒ,โ‹… ;

however, all of the ๐‘”

๐‘—(๐‘ฆโ€ฒ,โ‹…) could

individually be satisfiable

Problematic however if prover uses different ๐‘ฆโ€ฒ, ๐‘ฅโ€ฒ to construct proofs for different ๐‘”

๐‘—โ€™s

slide-32
SLIDE 32

Consistency Checking

Require that linear PCPs are systematic: linear PCP ๐œŒ contains a copy of the witness:

๐œŒ1 ๐œŒ2 ๐œŒ3 ๐‘ฅ1

โ€ฒ

๐‘ฅ3

โ€ฒ

๐‘ฅ1

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ2

โ€ฒ

๐‘ฅ3

โ€ฒ

  • ther components
  • ther components
  • ther components

First few components of proof correspond to witness associated with the statement

Goal: check that assignments to ๐‘ฅโ€ฒ are consistent via linear queries to ๐œŒ๐‘—

Each proof induces an assignment to a few bits of the common witness ๐‘ฅโ€ฒ

[See paper for details]

slide-33
SLIDE 33

Robust Decomposition

๐ท

๐‘”

1

๐‘”

2

โ‹ฏ ๐‘”

โ„“

  • Checking satisfiability of ๐ท

corresponds to checking satisfiability of ๐‘”

1, โ€ฆ , ๐‘” โ„“ (each

  • f which can be checked by a

circuit of size ฮค ๐ท โ„“)

  • For a false statement, no

single witness can simultaneously satisfy more than a constant fraction of ๐‘”

๐‘—

Quasi-Optimal Linear MIP

Robust decomposition can be instantiated by combining โ€œMPC-in-the-headโ€ paradigm

[IKOS07] with a robust MPC protocol with

polylogarithmic overhead [DIK10]

[See paper for details]

slide-34
SLIDE 34

Robust Decomposition

๐ท

๐‘”

1

๐‘”

2

โ‹ฏ ๐‘”

โ„“

  • Checking satisfiability of ๐ท

corresponds to checking satisfiability of ๐‘”

1, โ€ฆ , ๐‘” โ„“ (each

  • f which can be checked by a

circuit of size ฮค ๐ท โ„“)

  • For a false statement, no

single witness can simultaneously satisfy more than a constant fraction of ๐‘”

๐‘—

Consistency Check

  • Check that consistent witness is

used to prove satisfiability of each ๐‘”

๐‘—

  • Relies on pairwise consistency

checks and permuting the entries to obtain a โ€œniceโ€ replication structure

Quasi-Optimal Linear MIP

slide-35
SLIDE 35

Conclusions

A SNARG is quasi-optimal if it satisfies the following properties:

  • Quasi-optimal succinctness: ๐œŒ = เทจ

๐‘ƒ(๐œ‡)

  • Quasi-optimal prover complexity: ๐‘„ = เทจ

๐‘ƒ ๐ท + poly(๐œ‡, log ๐ท ) New framework for building quasi-optimal SNARGs by combining quasi-optimal linear MIP with linear-only vector encryption

  • Construction of a quasi-optimal linear MIP possible by combining robust

decomposition and consistency check What if we had a 1-bit SNARG? Implies a form of witness encryption

  • Highlights connection between soundness and confidentiality; see also

[BDRV18] which shows laconic zero-knowledge implies PKE

[See paper for details]

slide-36
SLIDE 36

Open Problems

Publicly-verifiable quasi-optimal SNARGs

  • Or: multi-theorem designated-verifier SNARGs

Quasi-optimal zero-knowledge SNARGs

Thank you!

https://eprint.iacr.org/2018/133