Cryptology ePrint Archive: Report 2017/1050

Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model

Sean Bowe and Ariel Gabizon and Ian Miers

Abstract: Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuable tool for verifiable computation and privacy preserving protocols. Currently practical schemes require a common reference string (CRS) to be constructed in a one-time setup for each statement. Ben-Sasson, Chiesa, Green, Tromer and Virza devised a multi-party protocol to securely compute such a CRS, and an adaptation of this protocol was used to construct the CRS for the Zcash cryptocurrency. The scalability of these protocols is obstructed by the need for a "precommitment round" which forces participants to be defined in advance and requires them to secure their secret randomness throughout the duration of the protocol.

Our primary contribution is a more scalable multi-party computation (MPC) protocol, secure in the random beacon model, which omits the precommitment round. We show that security holds even if an adversary has limited influence on the beacon. Next, we apply our main result to obtain a two-round protocol for computing an extended version of the CRS of Groth's SNARK. We show that knowledge soundness is maintained in the generic group model when using this CRS.

We also contribute a more secure pairing-friendly elliptic curve construction and implementation, tuned for use in zk-SNARKs, in light of recent optimizations to the Number Field Sieve algorithm which reduced the security estimates of existing pairing-friendly curves used in zk-SNARK applications.

Category / Keywords: cryptographic protocols / SNARKs, zero-knowledge, multi-party computation

Date: received 26 Oct 2017, last revised 3 Sep 2019

Contact author: sean at z cash, ariel gabizon at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20190903:081227 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]