### Abstract

We study the problem of constructing proof systems that achieve both soundness and zero knowledge unconditionally (without relying on intractability assumptions). Known techniques for this goal are primarily combinatorial, despite the fact that constructions of interactive proofs (IPs) and probabilistically checkable proofs (PCPs) heavily rely on algebraic techniques to achieve their properties. We present simple and natural modifications of well-known ‘algebraic’ IP and PCP protocols that achieve unconditional (perfect) zero knowledge in recently introduced models, overcoming limitations of known techniques. We modify the PCP of Ben-Sasson and Sudan [BS08] to obtain zero knowledge for NEXP in the model of Interactive Oracle Proofs [BCS16, RRR16], where the verifier, in each round, receives a PCP from the prover.We modify the IP of Lund et al. [LFKN92] to obtain zero knowledge for # P in the model of Interactive PCPs [KR08], where the verifier first receives a PCP from the prover and then interacts with him. The simulators in our zero knowledge protocols rely on solving a problem that lies at the intersection of coding theory, linear algebra, and computational complexity, which we call the succinct constraint detection problem, and consists of detecting dual constraints with polynomial support size for codes of exponential block length. Our two results rely on solutions to this problem for fundamental classes of linear codes: An algorithm to detect constraints for Reed–Muller codes of exponential length. This algorithm exploits the Raz–Shpilka [RS05] deterministic polynomial identity testing algorithm, and shows, to our knowledge, a first connection of algebraic complexity theory with zero knowledge.An algorithm to de tect constraints for PCPs of Proximity of Reed–Solomon codes [BS08] of exponential degree. This algorithm exploits the recursive structure of the PCPs of Proximity to show that small-support constraints are “locally” spanned by a small number of small-support constraints.

Original language | English (US) |
---|---|

Title of host publication | Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings |

Editors | Yael Kalai, Leonid Reyzin |

Publisher | Springer-Verlag |

Pages | 172-206 |

Number of pages | 35 |

ISBN (Print) | 9783319705026 |

DOIs | |

State | Published - Jan 1 2017 |

Event | 15th International Conference on Theory of Cryptography, TCC 2017 - Baltimore, United States Duration: Nov 12 2017 → Nov 15 2017 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 10678 LNCS |

ISSN (Print) | 0302-9743 |

ISSN (Electronic) | 1611-3349 |

### Other

Other | 15th International Conference on Theory of Cryptography, TCC 2017 |
---|---|

Country | United States |

City | Baltimore |

Period | 11/12/17 → 11/15/17 |

### Keywords

- Interactive proofs
- Polynomial identity testing
- Probabilistically checkable proofs
- Sumcheck
- Zero knowledge

### ASJC Scopus subject areas

- Theoretical Computer Science
- Computer Science(all)

## Fingerprint Dive into the research topics of 'Zero knowledge protocols from succinct constraint detection'. Together they form a unique fingerprint.

## Cite this

*Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings*(pp. 172-206). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10678 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-70503-3_6