Paper 2023/1967
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
Shafik Nassar, The University of Texas at Austin
Brent Waters, The University of Texas at Austin, NTT Research
David J. Wu, The University of Texas at Austin
Abstract
A monotone policy batch language is parameterized by a monotone policy and an relation . A statement is a YES instance if there exists where . For example, we might say that an instance is a YES instance if a majority of the statements are true. A monotone policy batch argument (BARG) for allows a prover to prove that with a proof of size , where is the security parameter, is the size of the Boolean circuit that computes , and is the number of instances. Recently, Brakerski, Brodsky, Kalai, Lombardi, and Paneth (CRYPTO 2023) gave the first monotone policy BARG for from the learning with errors (LWE) assumption.
In this work, we describe a generic approach for constructing monotone policy BARGs from any BARG for together with an additively homomorphic encryption scheme. This yields the first constructions of monotone policy BARGs from the - assumption in prime-order pairing groups as well as the (subexponential) DDH assumption in pairing-free groups. Central to our construction is a notion of a zero-fixing hash function, which is a relaxed version of a predicate-extractable hash function from the work of Brakerski et al. Our relaxation enables a direct realization of zero-fixing hash functions from BARGs for and additively homomorphic encryption, whereas the previous notion relied on leveled homomorphic encryption, and by extension, the LWE assumption.
As an application, we also show how to combine a monotone policy BARG with a puncturable signature scheme to obtain a monotone policy aggregate signature scheme. Our work yields the first (statically-secure) monotone policy aggregate signatures that supports general monotone Boolean circuits from standard pairing-based assumptions. Previously, this was only known from LWE.