Author:
Masip-Ardevol Héctor,Baylina-Melé Jordi,Guzmán-Albiol Marc,Muñoz-Tapia Jose Luis
Abstract
AbstractSTARK is a widely used transparent proof system that uses low-degree tests for proving the correctness of a computer program. STARK consumes an intermediate representation known as AIR that is more appropriate for programs with a relatively short and structured description. However, an AIR is not able to succinctly express non-equality constraints, leading to the incorporation of unwanted polynomials. We present the eSTARK protocol, a new probabilistic proof that generalizes the STARK family through the introduction of a more generic intermediate representation called eAIR. We describe eSTARK in the polynomial IOP model, which combines the optimized version of the STARK protocol with the incorporation of three arguments into the protocol. We also explain various techniques that enhance the vanilla STARK complexity, including optimizations applied to polynomial computations, and analyze the tradeoffs between controlling the constraint degree either at the representation of the AIR or inside the eSTARK itself.
Funder
Universitat Politècnica de Catalunya
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Arora S., Safra S.: Probabilistic checking of proofs; A new characterization of NP, pp. 2–13 (1992). https://doi.org/10.1109/SFCS.1992.267824.
2. Attema T., Fehr S., Klooß M.: Fiat-Shamir Transformation of Multi-Round Interactive Proofs. Cryptology ePrint Archive, Report 2021/1377. https://eprint.iacr.org/2021/1377 (2021).
3. Ben-Sasson E., Bentov I., Horesh Y., Riabzev M.: Fast reed-solomon interactive oracle proofs of proximity. In: 45th international colloquium on automata, languages, and programming (icalp 2018) 2018, pp. 14–11417 (2018). https://doi.org/10.4230/LIPIcs.ICALP.2018.14.
4. Ben-Sasson E., Bentov I., Horesh Y., Riabzev M.: Scalable zero knowledge with no trusted setup. In: Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III 39, pp. 701–732 (2019). https://doi.org/10.1007/978-3-030-26954-8_23
5. Ben-Sasson E., Bentov I., Horesh Y., Riabzev M.: Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Report 2018/046. https://eprint.iacr.org/2018/046 (2018).