Skip to main content

Practical Statistically-Sound Proofs of Exponentiation in Any Group

  • Conference paper
  • First Online:
Advances in Cryptology – CRYPTO 2022 (CRYPTO 2022)

Abstract

A proof of exponentiation (PoE) in a group \({\mathbb {G}}\) of unknown order allows a prover to convince a verifier that a tuple \((x,q,T,y)\in {\mathbb {G}}\times {\mathbb {N}}\times {\mathbb {N}}\times {\mathbb {G}}\) satisfies \(x^{q^T}=y\). This primitive has recently found exciting applications in the constructions of verifiable delay functions and succinct arguments of knowledge. The most practical PoEs only achieve soundness either under computational assumptions, i.e., they are arguments (Wesolowski, Journal of Cryptology 2020), or in groups that come with the promise of not having any small subgroups (Pietrzak, ITCS 2019). The only statistically-sound PoE in general groups of unknown order is due to Block et al. (CRYPTO 2021), and can be seen as an elaborate parallel repetition of Pietrzak’s PoE: to achieve \(\lambda \) bits of security, say \(\lambda =80\), the number of repetitions required (and thus the blow-up in communication) is as large as \(\lambda \).

In this work, we propose a statistically-sound PoE for the case where the exponent q is the product of all primes up to some bound B. We show that, in this case, it suffices to run only \(\lambda /\log (B)\) parallel instances of Pietrzak’s PoE, which reduces the concrete proof-size compared to Block et al. by an order of magnitude. Furthermore, we show that in the known applications where PoEs are used as a building block such structured exponents are viable. Finally, we also discuss batching of our PoE, showing that many proofs (for the same \(\mathbb {G}\) and q but different x and T) can be batched by adding only a single element to the proof per additional statement.

Pavel Hubáček was supported by the Grant Agency of the Czech Republic under the grant agreement no. 19-27871X and by the Charles University project UNCE/SCI/004. Chethan Kamath is supported by Azrieli International Postdoctoral Fellowship. Karen Klein was supported in part by ERC CoG grant 724307 and conducted part of this work at Institute of Science and Technology Austria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    In VDFs, it is an explicit “sequentiality assumption” that \(y=x^{q^T}\) cannot be computed faster (i.e., with fewer sequential computational steps) than as described above, even when using massive parallelism.

  2. 2.

    A prime p is safe if \((p-1)/2\) is also prime.

  3. 3.

    A minor nuisance would be the need to roll back the blockchain once a flawed proof was added and recognized. But an attacker that can forge proofs controls the randomness, and thus can do things like attaching a pre-computed chain to the current one in order to do a double spending attack with only little resources.

  4. 4.

    In [7] many results are stated only for odd choices of q. In Appendix B we show that they also hold for even q.

  5. 5.

    Note that the delay functions in the RSA group and class groups of imaginary quadratic field lose their sequentiality property in the quantum setting since the order of these groups can be efficiently computed.

  6. 6.

    The observation that random batching can be attacked using low-order elements was already made in [12].

  7. 7.

    If the (malicious) prover does not cheat on the modified statement, the verifier will anyway catch it during the final exponentiation.

  8. 8.

    The case where \(T-C\) is not a power of 2 can be handled by a standard approach similar to [40, Section 3.1].

  9. 9.

    To be precise, it suffices for the soundness of the PoE to be based on a hardness assumption that is at most as strong as the hardness assumption that is used for showing the binding or knowledge soundness of the polynomial commitment.

References

  1. Abusalah, H., Kamath, C., Klein, K., Pietrzak, K., Walter, M.: Reversible proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part II. LNCS, vol. 11477, pp. 277–291. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17656-3_10

    Chapter  Google Scholar 

  2. Arun, A., Ganesh, C., Lokam, S., Mopuri, T., Sridhar, S.: Dew: transparent constant-sized zkSNARKs. Cryptology ePrint Archive, Paper 2022/419 (2022). https://eprint.iacr.org/2022/419

  3. Belabas, K., Kleinjung, T., Sanso, A., Wesolowski, B.: A note on the low order assumption in class group of an imaginary quadratic number fields. Cryptology ePrint Archive, Paper 2020/1310 (2020). https://eprint.iacr.org/2020/1310

  4. Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236–250. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054130

    Chapter  Google Scholar 

  5. Beller, M.J., Yacobi, Y.: Batch Diffie-Hellman key agreement systems and their application to portable communications. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 208–220. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-47555-9_19

    Chapter  Google Scholar 

  6. Bitansky, N., Goldwasser, S., Jain, A., Paneth, O., Vaikuntanathan, V., Waters, B.: Time-lock puzzles from randomized encodings. In: Sudan, M. (ed.) Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, 14–16 January 2016, pp. 345–356. ACM (2016)

    Google Scholar 

  7. Block, A.R., Holmgren, J., Rosen, A., Rothblum, R.D., Soni, P.: Time- and space-efficient arguments from groups of unknown order. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021, Part IV. LNCS, vol. 12828, pp. 123–152. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_5

    Chapter  Google Scholar 

  8. Blocki, J., Lee, S., Zhou, S.: On the security of proofs of sequential work in a post-quantum world. In: Tessaro, S. (ed.) 2nd Conference on Information-Theoretic Cryptography, ITC 2021, 23–26 July 2021, Virtual Conference. LIPIcs, vol. 199, pp. 22:1–22:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021)

    Google Scholar 

  9. Boneh, D., Bonneau, J., Bünz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018, Part I. LNCS, vol. 10991, pp. 757–788. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96884-1_25

    Chapter  Google Scholar 

  10. Boneh, D., Bünz, B., Fisch, B.: A survey of two verifiable delay functions. IACR Cryptology ePrint Archive 2018:712 (2018)

    Google Scholar 

  11. Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236–254. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_15

    Chapter  Google Scholar 

  12. Boyd, C., Pavlovski, C.: Attacking and repairing batch verification schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 58–71. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44448-3_5

    Chapter  Google Scholar 

  13. Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. J. Cryptol. 1(2), 107–118 (1988). https://doi.org/10.1007/BF02351719

    Article  MathSciNet  MATH  Google Scholar 

  14. Bünz, B., Fisch, B., Szepieniec, A.: Transparent SNARKs from DARK compilers. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part I. LNCS, vol. 12105, pp. 677–706. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45721-1_24

    Chapter  Google Scholar 

  15. Cai, J., Lipton, R.J., Sedgewick, R., Yao, A.C.: Towards uncheatable benchmarks. In: 1993 Proceedings of the Eighth Annual Structure in Complexity Theory Conference, pp. 2–11, May 1993

    Google Scholar 

  16. Chavez-Saab, J., Henríquez, F.R., Tibouchi, M.: Verifiable isogeny walks: towards an isogeny-based postquantum VDF. Cryptology ePrint Archive, Report 2021/1289 (2021). https://ia.cr/2021/1289

  17. Chen, M., et al.: Multiparty generation of an RSA modulus. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 64–93. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_3

    Chapter  Google Scholar 

  18. Choudhuri, A.R., Hubáček, P., Kamath, C., Pietrzak, K., Rosen, A., Rothblum, G.N.: PPAD-hardness via iterated squaring modulo a composite. Cryptology ePrint Archive, Report 2019/667 (2019). https://ia.cr/2019/667

  19. Cohen, B., Pietrzak, K.: Simple proofs of sequential work. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018, Part II. LNCS, vol. 10821, pp. 451–467. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78375-8_15

    Chapter  Google Scholar 

  20. Döttling, N., Garg, S., Malavolta, G., Vasudevan, P.N.: Tight verifiable delay functions. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 65–84. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-57990-6_4

    Chapter  Google Scholar 

  21. Döttling, N., Lai, R.W.F., Malavolta, G.: Incremental proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part II. LNCS, vol. 11477, pp. 292–323. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17656-3_11

    Chapter  Google Scholar 

  22. Dummit, D.S., Foote, R.M.: Abstract Algebra, 3rd edn. Wiley, Hoboken (2003)

    MATH  Google Scholar 

  23. Ephraim, N., Freitag, C., Komargodski, I., Pass, R.: Continuous verifiable delay functions. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part III. LNCS, vol. 12107, pp. 125–154. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_5

    Chapter  Google Scholar 

  24. Erdõs, P.: Beweis eines satzes von Tschebyschef (on a proof of a theorem of Chebyshev, in German). Acta Litt. Sci. Szeged 5, 194–198 (1932)

    Google Scholar 

  25. De Feo, L., Masson, S., Petit, C., Sanso, A.: Verifiable delay functions from supersingular isogenies and pairings. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part I. LNCS, vol. 11921, pp. 248–277. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_10

    Chapter  Google Scholar 

  26. Fiat, A.: Batch RSA. J. Cryptol. 10(2), 75–88 (1997). https://doi.org/10.1007/s001459900021

    Article  MATH  Google Scholar 

  27. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12

    Chapter  Google Scholar 

  28. Frederiksen, T.K., Lindell, Y., Osheter, V., Pinkas, B.: Fast distributed RSA key generation for semi-honest and malicious adversaries. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018, Part II. LNCS, vol. 10992, pp. 331–361. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_12

    Chapter  Google Scholar 

  29. Freitag, C., Komargodski, I.: The cost of statistical security in interactive proofs for repeated squaring. Cryptology ePrint Archive, Paper 2022/766 (2022). https://eprint.iacr.org/2022/766

  30. Freitag, C., Komargodski, I., Pass, R., Sirkin, N.: Non-malleable time-lock puzzles and applications. In: Nissim, K., Waters, B. (eds.) TCC 2021, Part III. LNCS, vol. 13044, pp. 447–479. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90456-2_15

    Chapter  Google Scholar 

  31. Hoffmann, C., Hubáček, P., Kamath, C., Klein, K., Pietrzak, K.: Practical statistically-sound proofs of exponentiation in any group. Cryptology ePrint Archive, Report 2022/??? (2022)

    Google Scholar 

  32. Katz, J., Loss, J., Xu, J.: On the security of time-lock puzzles and timed commitments. In: Pass, R., Pietrzak, K. (eds.) TCC 2020, Part III. LNCS, vol. 12552, pp. 390–413. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64381-2_14

    Chapter  MATH  Google Scholar 

  33. Lenstra, A.K., Wesolowski, B.: Trustworthy public randomness with sloth, unicorn, and trx. Int. J. Appl. Cryptogr. 3(4), 330–343 (2017)

    Article  MathSciNet  Google Scholar 

  34. Lombardi, A., Vaikuntanathan, V.: Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 632–651. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_22

    Chapter  Google Scholar 

  35. Mahmoody, M., Moran, T., Vadhan, S.: Time-lock puzzles in the random oracle model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 39–50. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_3

    Chapter  MATH  Google Scholar 

  36. Mahmoody, M., Moran, T., Vadhan, S.P.: Publicly verifiable proofs of sequential work. In: Kleinberg, R.D. (ed.) Innovations in Theoretical Computer Science, ITCS 2013, Berkeley, CA, USA, 9–12 January 2013, pp. 373–388. ACM (2013)

    Google Scholar 

  37. Mahmoody, M., Smith, C., Wu, D.J.: Can verifiable delay functions be based on random oracles? In: ICALP. LIPIcs, vol. 168, pp. 83:1–83:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2020)

    Google Scholar 

  38. May, T.C.: Timed-release crypto (1994)

    Google Scholar 

  39. M’Raïhi, D., Naccache, D.: Batch exponentiation: a fast DLP-based signature generation strategy. In: Gong, L., Stearn, J. (eds.) CCS 1996, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14–16 March 1996, pp. 58–61. ACM (1996)

    Google Scholar 

  40. Pietrzak, K.: Simple verifiable delay functions. In: Blum, A. (ed.) 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, San Diego, California, USA, 10–12 January 2019. LIPIcs, vol. 124, pp. 60:1–60:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2019)

    Google Scholar 

  41. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  42. Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA (1996)

    Google Scholar 

  43. Rotem, L.: Simple and efficient batch verification techniques for verifiable delay functions. In: Nissim, K., Waters, B. (eds.) TCC 2021, Part III. LNCS, vol. 13044, pp. 382–414. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90456-2_13

    Chapter  Google Scholar 

  44. Rotem, L., Segev, G.: Generically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functions. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 481–509. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_17

    Chapter  Google Scholar 

  45. Rotem, L., Segev, G., Shahaf, I.: Generic-group delay functions require hidden-order groups. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part III. LNCS, vol. 12107, pp. 155–180. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_6

    Chapter  Google Scholar 

  46. Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., Weippl, E.R.: RandRunner: distributed randomness from trapdoor VDFs with strong uniqueness. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21–25 February 2021. The Internet Society (2021)

    Google Scholar 

  47. Shani, B.: A note on isogeny-based hybrid verifiable delay functions. Cryptology ePrint Archive, Report 2019/205 (2019). https://ia.cr/2019/205

  48. Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1–18. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78524-8_1

    Chapter  MATH  Google Scholar 

  49. van Baarsen, A., Stevens, M.: On time-lock cryptographic assumptions in abelian hidden-order groups. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part II. LNCS, vol. 13091, pp. 367–397. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-92075-3_13

    Chapter  Google Scholar 

  50. Wesolowski, B.: Efficient verifiable delay functions. J. Cryptol. 33, 2113–2147 (2020)

    Article  MathSciNet  Google Scholar 

  51. Wesolowski, B., Williams, R.: Lower bounds for the depth of modular squaring. Cryptology ePrint Archive, Report 2020/1461 (2020). https://ia.cr/2020/1461

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charlotte Hoffmann .

Editor information

Editors and Affiliations

Appendices

A Improving Verifier’s Efficiency

In Fig. 2 we see that for large values of B and q the verifier’s complexity increases because the final computation \((y')^{q^C}\) becomes expensive. The cost of this computation is \(C\cdot \log (q)\), where so far we have set \(C=t\log (B)\). We can reduce this number to \(C=t\log (B)/2\) by setting q to

$$\begin{aligned} q=2^2\cdot 3^2\cdot \prod _{3<p<B}p. \end{aligned}$$
(2)

It is straightforward to check that this does not affect our soundness bound, but it has a notable effect on verifier’s efficiency as shown in Fig. 6.

Fig. 6.
figure 6

Number of multiplications of the verifier in one round for 80-bit security depending on the bound \(B\). The blue line is the number of multiplications in [7], the dotted orange graph is the complexity of our protocol with \(C=t\log (B)\), the red graph is the complexity in our protocol with \(C=t\log (B)/2\) and the green line is the verifier’s complexity in [40]. (Color figure online)

This approach can be generalized to setting \(C=t\log (B)/k\) for any integer \(k\le \log (B)\). To ensure soundness we need to modify q as follows: Let m be the largest prime number such that \(m<2^k\). Then we set

$$\begin{aligned} q=2^k\cdot 3^{\lceil k/\log (3)\rceil }\cdot 5^{\lceil k/\log (5)\rceil }\cdots m^{\lceil k/\log (m)\rceil }\cdot \prod _{m<p<B}p. \end{aligned}$$

In particular, the choice of q that optimizes verifier’s efficiency for large values of B is

$$\begin{aligned} q=\prod _{p<B}p^{\lceil \log (B)/\log (p)\rceil } \end{aligned}$$

for which we can set \(C=t\). The cost for the verifier with this parameters is shown in Fig. 7. We conclude that the verifier’s complexity of our scheme improves upon [7] for values of B from 59 up to 2749, which corresponds to values of q between approximately \(2^{71}\) and \(2^{400\cdot \log (2749)}\approx 2^{3167}\).

Fig. 7.
figure 7

Number of multiplications of the verifier in one round for 80-bit security depending on the bound \(B\). The dotted blue line is the number of multiplications in [7], the orange graph is the complexity of our protocol with \(C=t\) and q as above and the green line is verifier’s complexity in [40] (which is 240 multiplications). (Color figure online)

B Application in Polynomial Commitments

In this section we analyse the gain in efficiency when we use our PoE as a building block instead of the one proposed in [7].

In the full version of the paper [31] we provide an overview of the polynomial commitment scheme in [7]. Here we only state the key properties that the PoE should satisfy in order to be applicable in the polynomial commitment scheme.

Requirements from the PoE. Note that the use of the PoE in the [7] polynomial commitment is more or less black-box. However, there are two important criteria that it should satisfy.

  1. 1.

    Firstly, the PoE has to satisfy statistical soundness so that the knowledge soundness of the polynomial commitment built upon it can be argued ([7, Lemma 6.4]).Footnote 9 Our PoE satisfies statistical soundness.

  2. 2.

    Secondly, the base \(q\) used in the PoE protocol is borrowed from the polynomial commitment. In order for the polynomial commitment to satisfy its homomorphic properties, [7] set it to be a large, odd integer – in particular, they require \(q\gg p\cdot 2^{n\textbf{poly} (\lambda )}\). This requirement that \(q\) be large, as we saw in Sect. 2 is advantageous for our PoE. On the other hand, the requirement that \(q\) be odd is in conflict with our trick of choosing an even \(q\) as in Eq. (1). However, we show in the full version of the paper [31] that the requirement that \(q\) be odd is not necessary in [7].

1.1 B.1 Efficiency

In this section we analyze the improvement in efficiency of the polynomial commitment scheme in [7] using our PoE, the batching protocol and the optimization in Appendix A. In the polynomial commitment scheme the PoE protocol is used to prove statements of the form \(x_i^{q^{2^{n-k-1}}}=y_i\) for every \(i\in \left[ \lambda \right] \) and every \(k\in \{0,1,\ldots ,n-1\}\).

Communication Complexity. In [7] the communication complexity of proving \(\lambda \) many statements with the same exponent is \(\lambda (n-k-1)\) group elements. This gives a total PoE proof-size of

$$\begin{aligned} \lambda \sum _{k=0}^{n-1}(n-k-1)=\frac{\lambda }{2}(n-1)n. \end{aligned}$$

As we have seen in Sect. 3.2, in our PoE the cost of proving \(\lambda n\) statements, in which the largest exponent is \(q^{n-1}\), is

$$\begin{aligned} \lambda n\log ^*(n-1)+\frac{\lambda }{\log (B)}(n-1). \end{aligned}$$

We conclude that we decrease the proof-size of the polynomial commitment by a factor of approximately \(n/(2\log ^*(n-1))\). This number can be increased to n/2 at the cost of a higher verifier complexity. More generally, the number of recursive steps explained in Sect. 3.2 can be used to choose a trade-off between proof-size and verifier efficiency.

Verifier’s Efficiency. In [7] the verifier’s complexity of proving \(\lambda \) many statements with the same exponent is \(2\lambda ^2 (n-k-1)+\lambda \log (q)\) multiplications. This gives a total verifier’s complexity of

$$\begin{aligned} 2\lambda ^2\sum _{k=0}^{n-1}((n-k-1)+\lambda \log (q))=(\lambda \log (q)+2\lambda ^2(n-1))n. \end{aligned}$$

As we have seen in Sect. 3.2, in our PoE the cost of verifying \(\lambda n\) statements, in which the largest exponent is \(q^{n-1}\), is

$$\begin{aligned} (n-1)(6\log (B)+32)\rho ^2+3\lambda n\log ^*(C)\rho \cdot (\log (B)+5)+(\rho +\lambda n)\log (q)\approx 15\lambda ^2 n+\lambda n \log (q). \end{aligned}$$

Since in practice we have \(n\approx 32\), we conclude that the verifier’s efficiency of the polynomial commitment scheme implemented with our PoE is comparable to that in [7].

Rights and permissions

Reprints and permissions

Copyright information

© 2022 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hoffmann, C., Hubáček, P., Kamath, C., Klein, K., Pietrzak, K. (2022). Practical Statistically-Sound Proofs of Exponentiation in Any Group. In: Dodis, Y., Shrimpton, T. (eds) Advances in Cryptology – CRYPTO 2022. CRYPTO 2022. Lecture Notes in Computer Science, vol 13508. Springer, Cham. https://doi.org/10.1007/978-3-031-15979-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15979-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15978-7

  • Online ISBN: 978-3-031-15979-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics