eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2018/187

Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model

Sean Bowe and Ariel Gabizon

Abstract

We describe a variant of Groth's zk-SNARK [Groth, Eurocrypt 2016] that satisfies simulation extractability, which is a strong form of adaptive non-malleability. The proving time is almost identical to [Groth] and requires only two additional group operations. Our proof consists of 5 group elements rather than 3 as in [Groth], and the security proof requires the random oracle model.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
zk-snarksgeneric group modelnon-malleabilitysimulation-extractability
Contact author(s)
ariel @ z cash
History
2018-02-21: last of 5 revisions
2018-02-20: received
See all versions
Short URL
https://ia.cr/2018/187
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/187,
      author = {Sean Bowe and Ariel Gabizon},
      title = {Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model},
      howpublished = {Cryptology ePrint Archive, Paper 2018/187},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/187}},
      url = {https://eprint.iacr.org/2018/187}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.