Paper 2018/187

Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model

Sean Bowe and Ariel Gabizon

Abstract

We describe a variant of Groth's zk-SNARK [Groth, Eurocrypt 2016] that satisfies simulation extractability, which is a strong form of adaptive non-malleability. The proving time is almost identical to [Groth] and requires only two additional group operations. Our proof consists of 5 group elements rather than 3 as in [Groth], and the security proof requires the random oracle model.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
zk-snarksgeneric group modelnon-malleabilitysimulation-extractability
Contact author(s)
ariel @ z cash
History
2018-02-21: last of 5 revisions
2018-02-20: received
See all versions
Short URL
https://ia.cr/2018/187
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/187,
      author = {Sean Bowe and Ariel Gabizon},
      title = {Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model},
      howpublished = {Cryptology ePrint Archive, Paper 2018/187},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/187}},
      url = {https://eprint.iacr.org/2018/187}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.