Paper 2024/504
Polylogarithmic Proofs for Multilinears over Binary Towers
Abstract
The use of small fields has come to typify the design of modern, efficient SNARKs. In recent work, Diamond and Posen (EUROCRYPT '25) break a key trace-length barrier, by treating multilinear polynomials even over tiny fields—fields with fewer elements than the polynomial has coefficients. In this work, we make that advance applicable globally, by generically reducing the problem of tiny-field commitment to that of large-field commitment. We introduce a sumcheck-based technique—which we call "ring-switching"—which, on input a multilinear polynomial commitment scheme over a large extension field, yields a further scheme over that field's ground field. The resulting tiny-field scheme, like Diamond and Posen's, lacks "embedding overhead", in the sense that its commitment cost is identical to that of the large-field scheme on each input size (measured in bits). Its evaluation protocol adds to the cost of the underlying large-field scheme's just a concretely small, additive polylogarithmic overhead. Instantiating our compiler on the BaseFold (CRYPTO '24) large-field multilinear polynomial commitment scheme—or more precisely, on a characteristic-2 adaptation of that scheme, which we develop at length—we obtain an extremely efficient scheme for multilinears over tiny binary fields. Our scheme outperforms Diamond–Posen and represents a new state-of-the-art.
Note: Various adjustments to concurrent work comparison.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- binary fieldssuccinct argumentsproximity testing
- Contact author(s)
-
bdiamond @ irreducible com
jposen @ irreducible com - History
- 2025-03-24: last of 6 revisions
- 2024-03-29: received
- See all versions
- Short URL
- https://ia.cr/2024/504
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/504, author = {Benjamin E. Diamond and Jim Posen}, title = {Polylogarithmic Proofs for Multilinears over Binary Towers}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/504}, year = {2024}, url = {https://eprint.iacr.org/2024/504} }