tl;dr: A zero-knowledge proof (ZKP) system for an NP relation
Introduction
This blog post formalizes zero-knowledge proof (ZKP) systems, mostly deferring to Groth’s formalization from [Grot16]1.
For a more mild, high-level introduction to ZKPs via a Sudoku puzzle example, see these slides.
Preliminaries
- We assume familiarity with the NP computational class and its NP relation characterization
- Let
denote a negligible function - We denote NP relations by
- We denote an NP statement by
and a witness by - We often denote
as . - We use
to denote that an algorithm on input returns and another algorithm on the same input returns - We denote the set of all relations outputted by a relation generator
by
Algorithms
A zero-knowledge proof (ZKP) system is a tuple of algorithms:
- a relation generator, used to formalize the fact that the ZKP works for all NP relations
- a setup algorithm, used to generate the proving key and verifying key for an NP relation
- a proving algorithm
- a proof verification algorithm
- a proof simulation algorithm
We describe each algorithm in detail below.
A relation generator that, given a security parameter
A recent impossibility result3
Groth points out1 that for ZKPs built from bilinear groups (e.g., Groth16), it is natural to let the bilinear group be returned via
Derives a proving key
Computes a zero-knowledge proof
Verifies a zero-knowledge proof
Creates a zero-knowledge proof
The existence of a
Perfect correctness
Correctness says that any proof
[Perfect correctness]:
The definition above can be relaxed by only requiring that the probability is non-negligible (i.e.,
Knowledge-soundness
Intuitively, knowledge-soundness says that if a proof verifies for a statment
[Computational knowledge-soundness]:
Recall the
Describe computational soundness and explain where it suffices.
Zero-knowledge
The notion of a zero-knowledge proof was first proposed by Goldwasser, Micali and Rackoff6 and later generalized to any NP language by Goldreich, Micali and Wigderson7.
The key idea around defining zero-knowledge is to show that there exists a
This is formalized by arguing that no adversary can distinguish between proofs produced via
For the purpose of this blog post, the simulator’s extra power will be that it knows the trapdoor
[Perfect zero-knowledge]:
The adversary is even given the trapdoor
The many flavors of zero-knowledge
There are many ways of defining the zero-knowledge property of a ZKP scheme.
- Interactive: Some proof systems are interactive. Their zero-knowledge property is defined in terms of the existence of a simulator who, unlike a dishonest verifier, need not interact with the prover. This gives the simulator a bit more power to forge proofs.
- HVZK + Fiat-Shamir: Some interactive proof systems (e.g., Bulletproofs8) satisfy a relaxed version of zero-knowledge, called honest-verifier zero-knowledge (HVZK), where the verifier cannot be malicious and must follow the protocol. Such schemes are then converted to non-interactive ZKP schemes via the Fiat-Shamir (FS)9 transform.
-
On the Size of Pairing-Based Non-interactive Arguments, by Groth, Jens, in Advances in Cryptology – EUROCRYPT 2016, 2016 ↩ ↩2
-
The auxiliary information helps model adversarial relation generators and circumvent impossibility results3
4 around them. ↩ -
On the Existence of Extractable One-way Functions, by Bitansky, Nir and Canetti, Ran and Paneth, Omer and Rosen, Alon, in Proceedings of the Forty-sixth Annual ACM Symposium on Theory of Computing, 2014, [URL] ↩ ↩2
-
Limits of Extractability Assumptions with Distributional Auxiliary Input, by Boyle, Elette and Pass, Rafael, in Advances in Cryptology – ASIACRYPT 2015, 2015 ↩ ↩2
-
This order of quantifiers (
, an extractor) implies that the extractor gets full access to the adversary’s state and its randomly-tossed coins, if any. A stronger property would be black-box extraction which say and the extractor only gets oracle access to (e.g., cannot rewind it; does not see its “code” or state). There is quite a zoo of notions here to be unpacked. ↩ -
The Knowledge Complexity of Interactive Proof-systems, by Goldwasser, S and Micali, S and Rackoff, C, in Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, 1985, [URL] ↩
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design, by Goldreich, Oded and Micali, Silvio and Wigderson, Avi, in 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 1986 ↩
-
Bulletproofs: Short Proofs for Confidential Transactions and More, by B. Bünz and J. Bootle and D. Boneh and A. Poelstra and P. Wuille and G. Maxwell, in 2018 IEEE Symposium on Security and Privacy (SP), 2018 ↩
-
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, by Fiat, Amos and Shamir, Adi, in Advances in Cryptology — CRYPTO’ 86, 1987 ↩