Paper 2019/586
Simulation-Extractable zk-SNARK with a Single Verification
Abstract
This revised paper improves the previous simulation-extractable zk-SNARK (SE-SNARK) in terms of performance efficiency and the security. It removes the G_2 operation in verification, without degrading performance and size, and analyze the security of the nested hash collision more deeply to strengthen the security. The simulation-extractable zk-SNARK (SE-SNARK) introduces a security notion of non-malleability. The existing pairing-based zk-SNARKs designed from linear encoding are known to be vulnerable to algebraic manipulation of the proof. The latest SE-SNARKs check the proof consistency by increasing the proof size and the verification cost. In particular, the number of pairings increases almost doubles due to further verification. In this paper, we propose two novel SE-SNARK constructions with a single verification. The consistency check is subsumed in a single verification through employing a hash function. The proof size and verification time of the proposed SE-SNARK schemes are minimal in that it is the same as the state-of-the-art zk-SNARK without non-malleability. The proof in our SE-SNARK constructions comprises only three group elements (type III) in the QAP-based scheme and two group elements (type I) in the SAP-based scheme. The verification time in both requires only 3 pairings. The soundness of the proposed schemes is proven under the hash-algebraic knowledge (HAK) assumption and the collision-resistant hash assumption.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. IEEE ACCESS
- DOI
- 10.1109/ACCESS.2020.3019980
- Keywords
- pairing-based zk-SNARK simulation-extractability quadratic arithmetic program square arithmetic program
- Contact author(s)
-
jihyek @ kookmin ac kr
jiwonlee @ hanyang ac kr
hoh @ hanyang ac kr - History
- 2022-11-06: last of 6 revisions
- 2019-05-30: received
- See all versions
- Short URL
- https://ia.cr/2019/586
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/586, author = {Jihye Kim and Jiwon Lee and Hyunok Oh}, title = {Simulation-Extractable zk-{SNARK} with a Single Verification}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/586}, year = {2019}, doi = {10.1109/ACCESS.2020.3019980}, url = {https://eprint.iacr.org/2019/586} }