Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

Author:

Yang YangORCID,Han Shangbin,Xie Ping,Zhu Yan,Ding Zhenyang,Hou Shengjie,Xu Shicheng,Zheng Haibin

Abstract

With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof of hash preimage has a wide range of application scenarios. However, it is hard to implement it due to the transformation of efficiency and execution complexity. Currently, there are only zero-knowledge proof circuits of some widely used hash functions that have been implemented, such as SHA256. SM3 is a Chinese hash function standard published by the Chinese Commercial Cryptography Administration Office for the use of electronic authentication service systems, and hence might be used in several cryptographic applications in China. As the national cryptographic hash function standard, the zero-knowledge proof circuit of SM3 (Chinese Commercial Cryptography) has not been implemented. Therefore, this paper analyzed the SM3 algorithm process, designed a new layered circuit structure, and implemented the SM3 hash preimage zero-knowledge proof circuit with a circuit size reduced by half compared to the automatic generator. Moreover, we proposed several extended practical protocols based on the SM3 zero-knowledge proof circuit, which is widely used in blockchain.

Funder

Open Program of Neusoft Corporation

National Key R&D Program of China

Beijing Natural Science Foundation

Natural Science Foundation of China

China Postdoctoral Science Foundation

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference39 articles.

1. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems

2. On the size of pairing-based non-interactive arguments;Groth;Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques,2016

3. Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting;Bootle;Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques,2016

4. Bulletproofs: Short proofs for confidential transactions and more;Bünz;Proceedings of the 2018 IEEE Symposium on Security and Privacy,2018

5. Scalable, transparent, and post-quantum secure computational integrity;Ben-Sasson;Cryptol. EPrint Arch.,2018

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A CUDA-based parallel optimization method for SM3 hash algorithm;The Journal of Supercomputing;2024-06-10

2. Research on Quantum SSL Based on National Cryptography;2024 9th International Conference on Computer and Communication Systems (ICCCS);2024-04-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3