Succinct non-interactive arguments for bounded depth computations
Jawale, Ruta S
Loading…
Permalink
https://hdl.handle.net/2142/116136
Description
Title
Succinct non-interactive arguments for bounded depth computations
Author(s)
Jawale, Ruta S
Issue Date
2022-04-25
Director of Research (if dissertation) or Advisor (if thesis)
Khurana, Dakshita
Department of Study
Computer Science
Discipline
Computer Science
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
M.S.
Degree Level
Thesis
Keyword(s)
cryptography
cryptographic protocols
delegation schemes
non-interactive
Fiat-Shamir
sum-check
GKR
PPAD
lossy
correlation intractability
Language
eng
Abstract
We construct a succinct non-interactive publicly-verifiable delegation scheme for any logspace uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For a circuit C : {0, 1}^N → {0, 1} of size S and depth D, the prover runs in time poly(S), the communication complexity is D · polylog(S), and the verifier runs in time (D + N) · polylog(S). To obtain this result, we introduce a new cryptographic primitive: a lossy correlation-intractable hash function family. We use this primitive to soundly instantiate the Fiat-Shamir transform for a large class of interactive proofs, including the interactive sum-check protocol and the Goldwasser-Kalai-Rothblum (GKR) protocol, assuming the subexponential hardness of LWE. Additionally, by relying on the result of Choudhuri et al. (STOC 2019), we establish (sub-exponential) average-case hardness of PPAD, assuming the sub-exponential hardness of LWE.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.