TY - GEN
T1 - Efficient Generic Arithmetic for KKW
T2 - 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021
AU - Heath, David
AU - Kolesnikov, Vladimir
AU - Lu, Jiahui
N1 - Funding Information:
Acknowledgements. This work was supported in part by NSF award #1909769, by a Facebook research award, and by Georgia Tech’s IISP cybersecurity seed funding (CSF) award.
Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - Katz et al., CCS 2018 (KKW) is a popular and efficient MPC-in-the-head non-interactive ZKP (NIZK) scheme, which is the technical core of the post-quantum signature scheme Picnic, currently considered for standardization by NIST. The KKW approach simultaneously is concretely efficient, even on commodity hardware, and does not rely on trusted setup. Importantly, the approach scales linearly in the circuit size with low constants with respect to proof generation time, proof verification time, proof size, and RAM consumption. However, KKW works with Boolean circuits only and hence incurs significant cost for circuits that include arithmetic operations. In this work, we extend KKW with a suite of efficient arithmetic operations over arbitrary rings and Boolean conversions. Rings Z2k are important for NIZK as they naturally match the basic operations of modern programs and CPUs. In particular, we: – present a suitable ring representation consistent with KKW, – construct efficient conversion operators that translate between arithmetic and Boolean representations, and – demonstrate how to efficiently operate over the arithmetic representation, including a vector dot product of length-n vectors with cost equal to that of a single multiplication. These improvements substantially improve KKW for circuits with arithmetic. As one example, we can multiply 100 × 100 square matrices of 32 bit number using 3200 × smaller proof size than standard KKW (100 × improvement from our dot product construction and 32 × from moving to an arithmetic representation). We discuss in detail proof size and resource consumption and argue the practicality of running large proofs on commodity hardware.
AB - Katz et al., CCS 2018 (KKW) is a popular and efficient MPC-in-the-head non-interactive ZKP (NIZK) scheme, which is the technical core of the post-quantum signature scheme Picnic, currently considered for standardization by NIST. The KKW approach simultaneously is concretely efficient, even on commodity hardware, and does not rely on trusted setup. Importantly, the approach scales linearly in the circuit size with low constants with respect to proof generation time, proof verification time, proof size, and RAM consumption. However, KKW works with Boolean circuits only and hence incurs significant cost for circuits that include arithmetic operations. In this work, we extend KKW with a suite of efficient arithmetic operations over arbitrary rings and Boolean conversions. Rings Z2k are important for NIZK as they naturally match the basic operations of modern programs and CPUs. In particular, we: – present a suitable ring representation consistent with KKW, – construct efficient conversion operators that translate between arithmetic and Boolean representations, and – demonstrate how to efficiently operate over the arithmetic representation, including a vector dot product of length-n vectors with cost equal to that of a single multiplication. These improvements substantially improve KKW for circuits with arithmetic. As one example, we can multiply 100 × 100 square matrices of 32 bit number using 3200 × smaller proof size than standard KKW (100 × improvement from our dot product construction and 32 × from moving to an arithmetic representation). We discuss in detail proof size and resource consumption and argue the practicality of running large proofs on commodity hardware.
KW - MPC-in-the-Head
KW - Zero knowledge
UR - http://www.scopus.com/inward/record.url?scp=85112022047&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85112022047&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-78086-9_31
DO - 10.1007/978-3-030-78086-9_31
M3 - Conference contribution
AN - SCOPUS:85112022047
SN - 9783030780852
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 414
EP - 431
BT - Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings
A2 - Dolev, Shlomi
A2 - Margalit, Oded
A2 - Pinkas, Benny
A2 - Schwarzmann, Alexander
PB - Springer
Y2 - 8 July 2021 through 9 July 2021
ER -