### Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)

##### Abstract

Bulletproofs (Bünz et al. IEEE S&P 2018) are a celebrated ZK proof system that allows for short and efficient proofs, and have been implemented and deployed in several real-world systems. In practice, they are most often implemented in their non-interactive version obtained using the Fiat-Shamir transform. A security proof for this setting is necessary for ruling out malleability attacks. These attacks can lead to very severe vulnerabilities, as they allow an adversary to forge proofs re-using or modifying parts of the proofs provided by the honest parties. An earlier version of this work (Ganesh et al. EUROCRYPT 2022) provided evidence for non-malleability of Fiat-Shamir Bulletproofs. This was done by proving simulation-extractability, which implies non-malleability, in the algebraic group model. In this work, we generalize the former result and prove simulation extractability in the programmable random oracle model, removing the need for the algebraic group model. Along the way, we establish a generic chain of reductions for Fiat-Shamir-transformed multi-round public-coin proofs to be simulation-extractable in the (programmable) random oracle model, which may be of independent interest.

Note: Preliminary version appeared at EUROCRYPT 2022. This is a full version of EC:GOPTT22 with additional improved results and supersedes ePrint 2021/1393.

Available format(s)
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
zero knowledgeFiat-Shamirnon-malleabilitysimulation-extractabilityBulletproofs
Contact author(s)
chaya @ iisc ac in
orlandi @ cs au dk
mahakp @ cs au dk
takahashi akira 58s @ gmail com
dt @ concordium com
History
2023-02-15: approved
See all versions
Short URL
https://ia.cr/2023/147

CC BY

BibTeX

@misc{cryptoeprint:2023/147,
author = {Chaya Ganesh and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi},
title = {Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)},
howpublished = {Cryptology ePrint Archive, Paper 2023/147},
year = {2023},
note = {\url{https://eprint.iacr.org/2023/147}},
url = {https://eprint.iacr.org/2023/147}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.