2022
DOI: 10.2478/popets-2022-0047
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Set Membership Proofs using MPC-in-the-Head

Abstract: Set membership proofs are an invaluable part of privacy preserving systems. These proofs allow a prover to demonstrate knowledge of a witness w corresponding to a secret element x of a public set, such that they jointly satisfy a given NP relation, i.e. ℛ(w, x) = 1 and x is a member of a public set {x 1, . . . , x𝓁}. This allows the identity of the prover to remain hidden, eg. ring signatures and confidential transactions in cryptocurrencies. In this work, we develop a new tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…In a work concurrent to ours, Goel et al [27] provided a membership proof protocol towards building a ring signature, which is equivalent to our observation discussed above (i.e. restructuring a disjunctive proof statement to a disjunction of equalities).…”
Section: Related Workmentioning
confidence: 75%
See 3 more Smart Citations
“…In a work concurrent to ours, Goel et al [27] provided a membership proof protocol towards building a ring signature, which is equivalent to our observation discussed above (i.e. restructuring a disjunctive proof statement to a disjunction of equalities).…”
Section: Related Workmentioning
confidence: 75%
“…In addition, Mac'n'cheese can handle only Boolean or arithmetic circuits, therefore as an example, a mixed statement in the form of SHA256(g x ) = y would need around 250 million gates (as shown in Appendix B), while gOTzilla is compatible with techniques combining algebraic and non-algebraic statements similar to the work by Chase et al [19] as discussed in Section 5, and therefore we don't need to covert between circuit types. Finally, in comparison to the concurrent work of [27], and based on their reported numbers our protocol ¶ These estimates were provided by Mac'n'cheese [10] authors assuming cost per gate is 120ns. is roughly 6x more efficient in computational costs (assuming the reported runtime t in Table 2 of [27] only takes the prover's or the verifier's costs into account, but not both simultaneously as we do), namely for 2 13 elements our total runtime for 256 bits of statistical security (which implies a parameter τ = 80) is 644ms while the total runtime for [27] in an equivalent system would be 3960ms.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations