Paper 2013/670

Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces

Charanjit Jutla and Arnab Roy

Abstract

We state a switching lemma for tests on adversarial inputs involving bilinear pairings in hard groups, where the tester can effectively switch the randomness used in the test from being given to the adversary at the outset to being chosen after the adversary commits its input. The switching lemma can be based on any $k$-linear hardness assumptions on one of the groups. In particular, this enables convenient information theoretic arguments in the construction of sequence of games proving security of cryptographic schemes, mimicking proofs and constructions in the random oracle model. As an immediate application, we show that the quasi-adaptive NIZK proofs of Jutla and Roy [AsiaCrypt 2013] for linear subspaces can be further shortened to \emph{constant}-size proofs, independent of the number of witnesses and equations. In particular, under the XDH assumption, a length $n$ vector of group elements can be proven to belong to a subspace of rank $t$ with a quasi-adaptive NIZK proof consisting of just a single group element. Similar quasi-adaptive aggregation of proofs is also shown for Groth-Sahai NIZK proofs of linear multi-scalar multiplication equations, as well as linear pairing-product equations (equations without any quadratic terms).

Note: Fixed typo in definition of Strong QA-NIZK.

Metadata
Available format(s)
PDF
Publication info
A minor revision of an IACR publication in CRYPTO 2014
Keywords
NIZKbilinear pairingsquasi-adaptiveGroth-SahaiRandom OracleIBECCA2
Contact author(s)
csjutla @ us ibm com
arnabr @ gmail com
History
2018-09-14: last of 6 revisions
2013-10-24: received
See all versions
Short URL
https://ia.cr/2013/670
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/670,
      author = {Charanjit Jutla and Arnab Roy},
      title = {Switching Lemma for Bilinear Tests and Constant-size {NIZK} Proofs for Linear Subspaces},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/670},
      year = {2013},
      url = {https://eprint.iacr.org/2013/670}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.