Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval - - PowerPoint PPT Presentation
Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval - - PowerPoint PPT Presentation
Quasi-Optimal SNARGs via ia Lin inear Multi-Prover In Interactive Proofs Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu Non-Interactive Arguments for NP = , = 1 for some (, )
Non-Interactive Arguments for NP
โ๐ท = ๐ฆ โถ ๐ท ๐ฆ, ๐ฅ = 1 for some ๐ฅ
๐(๐ฆ, ๐ฅ) ๐(๐ฆ) accept / reject Completeness: ๐ท ๐ฆ, ๐ฅ = 1 โน Pr ๐ ๐ฆ, ๐ฅ , ๐ ๐ฆ = 1 = 1 Soundness: for all provers ๐โ of size 2๐ (๐ is a security parameter): ๐ฆ โ โ๐ท โน Pr ๐โ ๐ฆ , ๐ ๐ฆ = 1 โค 2โ๐
๐
Succinct Non-Interactive Arguments (SNARGs)
๐(๐ฆ, ๐ฅ) ๐(๐ฆ) accept / reject Argument system is succinct if:
- Prover communication is poly ๐ + log ๐ท
- ๐ can be implemented by a circuit of size poly ๐ + ๐ฆ + log ๐ท
Verifier complexity significantly smaller than classic NP verifier
โ๐ท = ๐ฆ โถ ๐ท ๐ฆ, ๐ฅ = 1 for some ๐ฅ ๐
Succinct Non-Interactive Arguments (SNARGs)
๐(๐ฆ, ๐ฅ) ๐(๐ฆ) accept / reject
๐
Argument consists of a single message Instantiation: โCS proofsโ in the random oracle model [Mic94]
Succinct Non-Interactive Arguments (SNARGs)
๐(๐, ๐ฆ, ๐ฅ) ๐(๐, ๐ฆ) accept / reject
๐
Argument consists of a single message
common reference string (CRS) verification state
Setup 1๐
๐ ๐
Can consider publicly- verifiable and secretly- verifiable SNARGs Preprocessing SNARGs: allow โexpensiveโ setup
Complexity Metrics for SNARGs
Soundness: for all provers ๐โ of size 2๐: ๐ฆ โ โ๐ท โน Pr ๐โ ๐ฆ , ๐ ๐ฆ = 1 โค 2โ๐
How short can the proofs be? ๐ = ฮฉ ๐ How much work is needed to generate the proof? ๐ = ฮฉ ๐ท
Even in the designated- verifier setting
[See paper for details]
Quasi-Optimal SNARGs
Soundness: for all provers ๐โ of size 2๐: ๐ฆ โ โ๐ท โน Pr ๐โ ๐ฆ , ๐ ๐ฆ = 1 โค 2โ๐
A SNARG (for Boolean circuit satisfiability) is quasi-optimal if it satisfies the following properties:
- Quasi-optimal succinctness:
๐ = ๐ โ polylog ๐, ๐ท = เทจ ๐(๐)
- Quasi-optimal prover complexity:
๐ = เทจ ๐ ๐ท + poly(๐, log ๐ท )
Quasi-Optimal SNARGs
Construction Prover Complexity Proof Size Assumption
CS Proofs [Mic94]
เทจ ๐( ๐ท ) เทจ ๐(๐2) Random Oracle
Groth [Gro10] GGPR [GGPR12]
เทจ ๐(๐ ๐ท 2 + ๐ท ๐2) เทจ ๐(๐ ๐ท ) เทจ ๐(๐) เทจ ๐(๐) Knowledge of Exponent
BCIOP (Pairing) [BCIOP13]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Encryption
BISW (LWE/RLWE) [BISW17]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Vector Encryption
Groth [Gro16]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Generic Group
Quasi-Optimal SNARGs
Construction Prover Complexity Proof Size Assumption
CS Proofs [Mic94]
เทจ ๐( ๐ท ) เทจ ๐(๐2) Random Oracle
Groth [Gro10] GGPR [GGPR12]
เทจ ๐(๐ ๐ท 2 + ๐ท ๐2) เทจ ๐(๐ ๐ท ) เทจ ๐(๐) เทจ ๐(๐) Knowledge of Exponent
BCIOP (Pairing) [BCIOP13]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Encryption
BISW (LWE/RLWE) [BISW17]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Vector Encryption
Groth [Gro16]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Generic Group
For simplicity, we ignore low order terms poly ๐, log ๐ท
Quasi-Optimal SNARGs
Construction Prover Complexity Proof Size Assumption
CS Proofs [Mic94]
เทจ ๐( ๐ท ) เทจ ๐(๐2) Random Oracle
Groth [Gro10] GGPR [GGPR12]
เทจ ๐(๐ ๐ท 2 + ๐ท ๐2) เทจ ๐(๐ ๐ท ) เทจ ๐(๐) เทจ ๐(๐) Knowledge of Exponent
BCIOP (Pairing) [BCIOP13]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Encryption
BISW (LWE/RLWE) [BISW17]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Linear-Only Vector Encryption
Groth [Gro16]
เทจ ๐(๐ ๐ท ) เทจ ๐(๐) Generic Group
This work
เทจ ๐ ๐ท เทจ ๐(๐) Linear-Only Vector Encryption
For simplicity, we ignore low order terms poly ๐, log ๐ท
This Work
New framework for building preprocessing SNARGs (following [BCIOP13, BISW17])
Step 1 (information-theoretic):
- Linear multi-prover interactive proofs (linear MIPs)
- This work: first construction of a quasi-optimal linear MIP
Step 2 (cryptographic):
- Linear-only vector encryption to simulate linear MIP model
- This work: linear MIP โน preprocessing SNARG
Results yield the first quasi-optimal SNARG (from linear-only vector encryption
- ver rings)
Linear PCPs [IKO07]
๐ โ ๐พ๐
๐ โ ๐พ๐ ๐, ๐ โ ๐พ Several possible instantiations: based on the Walsh-Hadamard code [ALMSS92] or quadratic span programs [GGPR13] Verifier
๐ฆ, ๐ฅ
PCP where the proof
- racle implements a
linear function ๐ โ ๐พ๐ In these instantiations, verifier is oblivious (queries independent of statement)
From Linear PCPs to SNARGs [BCIOP13]
๐1 ๐2 ๐3 ๐๐ โฏ
part of the CRS
๐ =
Verifier encrypts its queries using a linear-only encryption scheme
From Linear PCPs to SNARGs [BCIOP13]
๐1 ๐2 ๐3 ๐๐ โฏ
part of the CRS
๐ =
Verifier encrypts its queries using a linear-only encryption scheme
Encryption scheme that only supports linear homomorphism
From Linear PCPs to SNARGs [BCIOP13]
๐1 ๐2 ๐3 ๐๐ โฏ
part of the CRS
๐ =
Verifier encrypts its queries using a linear-only encryption scheme
๐ฆ, ๐ฅ ๐ โ ๐พ๐
Prover constructs linear PCP ๐ from (๐ฆ, ๐ฅ)
โจ๐, ๐1โฉ โจ๐, ๐2โฉ โฏ โจ๐, ๐๐โฉ
Prover homomorphically computes responses to linear PCP queries SNARG proof
From Linear PCPs to SNARGs [BCIOP13]
๐1 ๐2 ๐3 ๐๐ โฏ
part of the CRS
๐ =
Verifier encrypts its queries using a linear-only encryption scheme
๐ฆ, ๐ฅ ๐ โ ๐พ๐
Prover constructs linear PCP ๐ from (๐ฆ, ๐ฅ)
โจ๐, ๐1โฉ โจ๐, ๐2โฉ โฏ โจ๐, ๐๐โฉ
Prover homomorphically computes responses to linear PCP queries SNARG proof
Evaluating inner product requires ฮฉ ๐ท homomorphic operations; prover complexity: ฮฉ ๐ โ ฮฉ ๐ท = ฮฉ ๐ ๐ท Proof consists of a constant number of ciphertexts: total length ๐(๐) bits
We pay ฮฉ(๐) for each homomorphic
- peration. Can we
reduce this?
Linear-Only Encryption over Rings
Consider encryption scheme over a polynomial ring ๐๐ = ฮค โค๐ ๐ฆ ฮฆโ ๐ฆ โ ๐พ๐
โ
๐ฆ1 ๐ฆ2 ๐ฆ3 โฎ ๐ฆโ
Plaintext space can be viewed as a vector of field elements
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฎ ๐ฆโ
โฒ
๐ฆ1 + ๐ฆ1โฒ ๐ฆ2 + ๐ฆ2
โฒ
๐ฆ3 + ๐ฆ3
โฒ
โฎ ๐ฆโ + ๐ฆโ
โฒ
Homomorphic operations correspond to component-wise additions and scalar multiplications Using RLWE-based encryption schemes, can encrypt โ = เทจ ๐(๐) field elements (๐ = poly ๐ ) with ciphertexts of size เทจ ๐(๐)
Linear-Only Encryption over Rings
Consider encryption scheme over a polynomial ring ๐๐ = ฮค โค๐ ๐ฆ ฮฆโ ๐ฆ โ ๐พ๐
โ
๐ฆ1 ๐ฆ2 ๐ฆ3 โฎ ๐ฆโ
Plaintext space can be viewed as a vector of field elements
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฎ ๐ฆโ
โฒ
๐ฆ1 + ๐ฆ1โฒ ๐ฆ2 + ๐ฆ2
โฒ
๐ฆ3 + ๐ฆ3
โฒ
โฎ ๐ฆโ + ๐ฆโ
โฒ
Homomorphic operations correspond to component-wise additions and scalar multiplications Using RLWE-based encryption schemes, can encrypt โ = เทจ ๐(๐) field elements (๐ = poly ๐ ) with ciphertexts of size เทจ ๐(๐)
Amortized cost of homomorphic
- peration on a single field
element is polylog(๐)
Linear-Only Encryption over Rings
๐1 โ ๐พ๐
๐
๐2 โ ๐พ๐
๐
๐3 โ ๐พ๐
๐
โฎ ๐โ โ ๐พ๐
๐
โจ๐1, ๐1โฉ โจ๐2, ๐2โฉ โจ๐3, ๐3โฉ โฎ โจ๐โ, ๐โโฉ Given encrypted set of query vectors, prover can homomorphically apply independent linear functions to each slot
Linear Multi-Prover Interactive Proofs (MIPs)
๐ฆ, ๐ฅ
๐1 ๐2 โฏ ๐โ Verifier has oracle access to multiple linear proof oracles
[Proofs may be correlated]
Can convert linear MIP to preprocessing SNARG using linear-
- nly (vector) encryption over rings
Suppose
- Number of provers โ = เทจ
๐ ๐
- Proofs ๐1, โฆ , ๐โ โ ๐พ๐
๐ where ๐ =
ฮค ๐ท โ
- Number of queries to each ๐๐ is polylog(๐)
Then, linear MIP is quasi-optimal
Linear Multi-Prover Interactive Proofs (MIPs)
๐ฆ, ๐ฅ
๐1 ๐2 โฏ ๐โ
Suppose
- Number of provers โ = เทจ
๐ ๐
- Proofs ๐1, โฆ , ๐โ โ ๐พ๐
๐ where ๐ =
ฮค ๐ท โ
- Number of queries to each ๐๐ is polylog(๐)
Then, linear MIP is quasi-optimal
Linear Multi-Prover Interactive Proofs (MIPs)
๐ฆ, ๐ฅ
๐1 ๐2 โฏ ๐โ
Prover complexity: เทจ ๐ โ๐ = เทจ ๐ ๐ท Linear MIP size: ๐ โ โ polylog ๐ = เทจ ๐(๐)
Quasi-Optimal Linear MIPs
This work: Construction of a quasi-optimal linear MIP for Boolean circuit satisfiability
Robust Decomposition Consistency Check Quasi-Optimal Linear MIP
Robust Decomposition
(๐ฆ, ๐ฅ)
Encode
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฏ ๐ฆ๐
โฒ
๐ฅ1
โฒ
๐ฅ2
โฒ
๐ฅ3
โฒ
โฏ ๐ฅโ
โฒ
๐
1
๐
2
โฏ
Boolean circuit ๐ท of size ๐ก
๐
โ Statement- witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Decompose ๐ท into constraint functions ๐
1, โฆ , ๐ โ, where each
constraint can be computed by a circuit of size ๐ก/โ
Only depends on ๐ฆ
Each constraint only needs to read a subset of the input bits
Robust Decomposition
(๐ฆ, ๐ฅ)
Encode
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฏ ๐ฆ๐
โฒ
๐ฅ1
โฒ
๐ฅ2
โฒ
๐ฅ3
โฒ
โฏ ๐ฅโ
โฒ
๐
1
๐
2
โฏ
Boolean circuit ๐ท of size ๐ก
๐
โ Statement- witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Only depends on ๐ฆ
Decompose ๐ท into constraint functions ๐
1, โฆ , ๐ โ, where each
constraint can be computed by a circuit of size ๐ก/โ Each constraint only needs to read a subset of the input bits
Robust Decomposition
(๐ฆ, ๐ฅ)
Encode
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฏ ๐ฆ๐
โฒ
๐ฅ1
โฒ
๐ฅ2
โฒ
๐ฅ3
โฒ
โฏ ๐ฅโ
โฒ
๐
1
๐
2
โฏ
Boolean circuit ๐ท of size ๐ก
๐
โ Statement- witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Only depends on ๐ฆ
Decompose ๐ท into constraint functions ๐
1, โฆ , ๐ โ, where each
constraint can be computed by a circuit of size ๐ก/โ Each constraint only needs to read a subset of the input bits
Robust Decomposition
(๐ฆ, ๐ฅ)
Encode
๐ฆ1
โฒ
๐ฆ2
โฒ
๐ฆ3
โฒ
โฏ ๐ฆ๐
โฒ
๐ฅ1
โฒ
๐ฅ2
โฒ
๐ฅ3
โฒ
โฏ ๐ฅโ
โฒ
๐
1
๐
2
โฏ
Boolean circuit ๐ท of size ๐ก
๐
โ Statement- witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Completeness: If ๐ท ๐ฆ, ๐ฅ = 1, then ๐
๐ ๐ฆโฒ, ๐ฅโฒ = 1 for all ๐
Robustness: If ๐ฆ โ โ, then for all ๐ฅโฒ, at most 2/3 of ๐
๐ ๐ฆโฒ, ๐ฅโฒ = 1
Efficiency: (๐ฆโฒ, ๐ฅโฒ) can be computed by a circuit of size เทจ ๐(๐ก)
Only depends on ๐ฆ
Robust Decomposition
Boolean circuit ๐ท of size ๐ก ๐
1
๐
2
โฎ ๐
โ
๐1 ๐2 โฎ ๐โ
๐๐: linear PCP that ๐
๐(๐ฆโฒ,โ ) is satisfiable
(instantiated over ๐พ๐ where ๐ = poly(๐))
Using linear PCP based on QSPs [GGPR13], ๐๐ = ๐( ฮค ๐ท โ) and provides soundness 1/poly ๐ (๐ฆ, ๐ฅ)
Statement-witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Encode
(๐ฆโฒ, ๐ฅโฒ)
Robust Decomposition
Boolean circuit ๐ท of size ๐ก ๐
1
๐
2
โฎ ๐
โ
๐1 ๐2 โฎ ๐โ
๐๐: linear PCP that ๐
๐(๐ฆโฒ,โ ) is satisfiable
(instantiated over ๐พ๐ where ๐ = poly(๐))
Verifier invokes linear PCP verifier for each instance (๐ฆ, ๐ฅ)
Statement-witness for ๐ท Statement-witness for ๐
1, โฆ , ๐ โ
Encode
(๐ฆโฒ, ๐ฅโฒ)
Robust Decomposition
Boolean circuit ๐ท of size ๐ก ๐
1
๐
2
โฎ ๐
โ
๐1 ๐2 โฎ ๐โ
๐๐: linear PCP that ๐
๐(๐ฆโฒ,โ ) is satisfiable
(instantiated over ๐พ๐ where ๐ = poly(๐)) Completeness: Follows by completeness of decomposition and linear PCPs Soundness: Each linear PCP provides ฮค 1 poly ๐ soundness and for false statement, at least 1/3 of the statements are false, so if โ = ฮฉ(๐), verifier accepts with probability 2โฮฉ ๐
Robust Decomposition
Completeness: Follows by completeness of decomposition and linear PCPs Soundness: Each linear PCP provides ฮค 1 poly ๐ soundness and for false statement, at least 1/3 of the statements are false, so if โ = ฮฉ(๐), verifier accepts with probability 2โฮฉ ๐
Robustness: If ๐ฆ โ โ, then for all ๐ฅโฒ, at most 2/3 of ๐
๐ ๐ฆโฒ, ๐ฅโฒ = 1
For false ๐ฆ, no single ๐ฅโฒ can simultaneously satisfy ๐
๐ ๐ฆโฒ,โ ;
however, all of the ๐
๐(๐ฆโฒ,โ ) could
individually be satisfiable
Problematic however if prover uses different ๐ฆโฒ, ๐ฅโฒ to construct proofs for different ๐
๐โs
Consistency Checking
Require that linear PCPs are systematic: linear PCP ๐ contains a copy of the witness:
๐1 ๐2 ๐3 ๐ฅ1
โฒ
๐ฅ3
โฒ
๐ฅ1
โฒ
๐ฅ2
โฒ
๐ฅ2
โฒ
๐ฅ3
โฒ
- ther components
- ther components
- ther components
First few components of proof correspond to witness associated with the statement
Goal: check that assignments to ๐ฅโฒ are consistent via linear queries to ๐๐
Each proof induces an assignment to a few bits of the common witness ๐ฅโฒ
[See paper for details]
Robust Decomposition
๐ท
๐
1
๐
2
โฏ ๐
โ
- Checking satisfiability of ๐ท
corresponds to checking satisfiability of ๐
1, โฆ , ๐ โ (each
- f which can be checked by a
circuit of size ฮค ๐ท โ)
- For a false statement, no
single witness can simultaneously satisfy more than a constant fraction of ๐
๐
Quasi-Optimal Linear MIP
Robust decomposition can be instantiated by combining โMPC-in-the-headโ paradigm
[IKOS07] with a robust MPC protocol with
polylogarithmic overhead [DIK10]
[See paper for details]
Robust Decomposition
๐ท
๐
1
๐
2
โฏ ๐
โ
- Checking satisfiability of ๐ท
corresponds to checking satisfiability of ๐
1, โฆ , ๐ โ (each
- f which can be checked by a
circuit of size ฮค ๐ท โ)
- For a false statement, no
single witness can simultaneously satisfy more than a constant fraction of ๐
๐
Consistency Check
- Check that consistent witness is
used to prove satisfiability of each ๐
๐
- Relies on pairwise consistency
checks and permuting the entries to obtain a โniceโ replication structure
Quasi-Optimal Linear MIP
Conclusions
A SNARG is quasi-optimal if it satisfies the following properties:
- Quasi-optimal succinctness: ๐ = เทจ
๐(๐)
- Quasi-optimal prover complexity: ๐ = เทจ
๐ ๐ท + poly(๐, log ๐ท ) New framework for building quasi-optimal SNARGs by combining quasi-optimal linear MIP with linear-only vector encryption
- Construction of a quasi-optimal linear MIP possible by combining robust
decomposition and consistency check What if we had a 1-bit SNARG? Implies a form of witness encryption
- Highlights connection between soundness and confidentiality; see also
[BDRV18] which shows laconic zero-knowledge implies PKE
[See paper for details]
Open Problems
Publicly-verifiable quasi-optimal SNARGs
- Or: multi-theorem designated-verifier SNARGs