2018
DOI: 10.1007/978-3-030-03326-2_20
|View full text |Cite
|
Sign up to set email alerts
|

Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution

Abstract: There have been tremendous advances in reducing interaction, communication and verification time in zero-knowledge proofs but it remains an important challenge to make the prover efficient. We construct the first zero-knowledge proof of knowledge for the correct execution of a program on public and private inputs where the prover computation is nearly linear time. This saves a polylogarithmic factor in asymptotic performance compared to current state of the art proof systems. We use the TinyRAM model to captur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…The routing network has asymptotic complexity O(t log(t)), where t is the trace length, and large constants. A more efficient permutation proof, first explored by [15,41], shows that two secret lists…”
Section: Reverie Our Second Main Technical Contribution In This Work Ismentioning
confidence: 99%
See 1 more Smart Citation
“…The routing network has asymptotic complexity O(t log(t)), where t is the trace length, and large constants. A more efficient permutation proof, first explored by [15,41], shows that two secret lists…”
Section: Reverie Our Second Main Technical Contribution In This Work Ismentioning
confidence: 99%
“…We implement the unknown permutation proof using the circuit defined in Figure 2 over a large ring, based on techniques first introduced by Bootle et al [15], and first explored by Neff [41]. This stand-alone circuit receives two secret shared lists and a public randomly selected challenge x.…”
Section: Memory Permutation Proof (Over Z Q )mentioning
confidence: 99%
“…In ZK S C, lists (which play the role of arrays) have rather restrictive typing rules associated with them, making sure that computations with them can be converted into circuit operations. Having the keys in $post and in an arbitrary domain requires the use of Oblivious RAM (ORAM) [11], which has had a number of solutions proposed in the context of ZK proofs [5,20,28]. A general method for ORAM in ZKP context [28] performs no correctness checks while the load and store operations are executed.…”
Section: Useful Constructionsmentioning
confidence: 99%
“…In the decades since their introduction, zero-knowledge proofs have been used to support a wide variety of potential applications, ranging from verifiable outsourced computation [11,16,24,59] to anonymous credentials [6,27,28,32,39], with a multitude of other settings that also require a balance between privacy and integrity [17,19,29,31,36]. In recent years, cryptocurrencies have been one increasingly popular real-world application [10,44,52,57], with general zero-knowledge protocols now deployed in both Zcash and Ethereum.…”
Section: Introductionmentioning
confidence: 99%