Abstract
AbstractZero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn considerable attention for their appealing applications, e.g., verifiable computation and anonymous payment protocol. Compared with the pre-quantum case, the practicability of this primitive in the post-quantum setting is still unsatisfactory, especially for the space complexity. To tackle this issue, this work seeks to enhance the efficiency and compactness of lattice-based zk-SNARKs, including proof length and common reference string (CRS) length. In this paper, we develop the framework of square span program-based SNARKs and design new zk-SNARKs over cyclotomic rings. Compared with previous works, our construction is without parallel repetition and achieves shorter proof and CRS lengths than previous lattice-based zk-SNARK schemes. Particularly, the proof length of our scheme is around $$23.3\%$$
23.3
%
smaller than the recent shortest lattice-based zk-SNARKs by Ishai et al. (in: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 212–234, 2021), and the CRS length is $$3.6\times$$
3.6
×
smaller. Our constructions follow the framework of Gennaro et al. (in: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 556–573, 2018), and adapt it to the ring setting by slightly modifying the knowledge assumptions. We develop concretely small constructions by using module-switching and key-switching procedures in a novel way.
Publisher
Springer Science and Business Media LLC
Reference43 articles.
1. Albrecht MR, Player R, Scott S (2015) On the concrete hardness of learning with errors. J Math Cryptol 9(3):169–203
2. Albrecht MR, Cini V, Lai RW, Malavolta G, Thyagarajan SA (2022) Lattice-based snarks: publicly verifiable, preprocessing, and recursively composable. In: Annual international cryptology conference. Springer, pp 102–132
3. Alkim E, Ducas L, Pöppelmann T, Schwabe P (2016) Post-quantum key exchange: a new hope. In: 25th USENIX security symposium (USENIX Security 16), pp 327–343
4. Banaszczyk W (1995) Inequalities for convex bodies and polar reciprocal lattices in r n. Discrete Comput Geom 13:217–231
5. Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: verifying program executions succinctly and in zero knowledge. In: Advances in cryptology—CRYPTO 2013: 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22 2013. Proceedings, Part II. Springer, pp 90–108