Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3
Author:
Yang YangORCID,
Han Shangbin,
Xie Ping,
Zhu Yan,
Ding Zhenyang,
Hou Shengjie,
Xu Shicheng,
Zheng Haibin
Abstract
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof of hash preimage has a wide range of application scenarios. However, it is hard to implement it due to the transformation of efficiency and execution complexity. Currently, there are only zero-knowledge proof circuits of some widely used hash functions that have been implemented, such as SHA256. SM3 is a Chinese hash function standard published by the Chinese Commercial Cryptography Administration Office for the use of electronic authentication service systems, and hence might be used in several cryptographic applications in China. As the national cryptographic hash function standard, the zero-knowledge proof circuit of SM3 (Chinese Commercial Cryptography) has not been implemented. Therefore, this paper analyzed the SM3 algorithm process, designed a new layered circuit structure, and implemented the SM3 hash preimage zero-knowledge proof circuit with a circuit size reduced by half compared to the automatic generator. Moreover, we proposed several extended practical protocols based on the SM3 zero-knowledge proof circuit, which is widely used in blockchain.
Funder
Open Program of Neusoft Corporation
National Key R&D Program of China
Beijing Natural Science Foundation
Natural Science Foundation of China
China Postdoctoral Science Foundation
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference39 articles.
1. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
2. On the size of pairing-based non-interactive arguments;Groth;Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques,2016
3. Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting;Bootle;Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques,2016
4. Bulletproofs: Short proofs for confidential transactions and more;Bünz;Proceedings of the 2018 IEEE Symposium on Security and Privacy,2018
5. Scalable, transparent, and post-quantum secure computational integrity;Ben-Sasson;Cryptol. EPrint Arch.,2018
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A CUDA-based parallel optimization method for SM3 hash algorithm;The Journal of Supercomputing;2024-06-10
2. Research on Quantum SSL Based on National Cryptography;2024 9th International Conference on Computer and Communication Systems (ICCCS);2024-04-19