Paper 2018/187
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe and Ariel Gabizon
Abstract
We describe a variant of Groth's zk-SNARK [Groth, Eurocrypt 2016] that satisfies simulation extractability, which is a strong form of adaptive non-malleability. The proving time is almost identical to [Groth] and requires only two additional group operations. Our proof consists of 5 group elements rather than 3 as in [Groth], and the security proof requires the random oracle model.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- zk-snarksgeneric group modelnon-malleabilitysimulation-extractability
- Contact author(s)
- ariel @ z cash
- History
- 2018-02-21: last of 5 revisions
- 2018-02-20: received
- See all versions
- Short URL
- https://ia.cr/2018/187
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/187, author = {Sean Bowe and Ariel Gabizon}, title = {Making Groth's zk-{SNARK} Simulation Extractable in the Random Oracle Model}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/187}, year = {2018}, url = {https://eprint.iacr.org/2018/187} }