Abstract
A proof of exponentiation (PoE) in a group \({\mathbb {G}}\) of unknown order allows a prover to convince a verifier that a tuple \((x,q,T,y)\in {\mathbb {G}}\times {\mathbb {N}}\times {\mathbb {N}}\times {\mathbb {G}}\) satisfies \(x^{q^T}=y\). This primitive has recently found exciting applications in the constructions of verifiable delay functions and succinct arguments of knowledge. The most practical PoEs only achieve soundness either under computational assumptions, i.e., they are arguments (Wesolowski, Journal of Cryptology 2020), or in groups that come with the promise of not having any small subgroups (Pietrzak, ITCS 2019). The only statistically-sound PoE in general groups of unknown order is due to Block et al. (CRYPTO 2021), and can be seen as an elaborate parallel repetition of Pietrzak’s PoE: to achieve \(\lambda \) bits of security, say \(\lambda =80\), the number of repetitions required (and thus the blow-up in communication) is as large as \(\lambda \).
In this work, we propose a statistically-sound PoE for the case where the exponent q is the product of all primes up to some bound B. We show that, in this case, it suffices to run only \(\lambda /\log (B)\) parallel instances of Pietrzak’s PoE, which reduces the concrete proof-size compared to Block et al. by an order of magnitude. Furthermore, we show that in the known applications where PoEs are used as a building block such structured exponents are viable. Finally, we also discuss batching of our PoE, showing that many proofs (for the same \(\mathbb {G}\) and q but different x and T) can be batched by adding only a single element to the proof per additional statement.
Pavel Hubáček was supported by the Grant Agency of the Czech Republic under the grant agreement no. 19-27871X and by the Charles University project UNCE/SCI/004. Chethan Kamath is supported by Azrieli International Postdoctoral Fellowship. Karen Klein was supported in part by ERC CoG grant 724307 and conducted part of this work at Institute of Science and Technology Austria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
In VDFs, it is an explicit “sequentiality assumption” that \(y=x^{q^T}\) cannot be computed faster (i.e., with fewer sequential computational steps) than as described above, even when using massive parallelism.
- 2.
A prime p is safe if \((p-1)/2\) is also prime.
- 3.
A minor nuisance would be the need to roll back the blockchain once a flawed proof was added and recognized. But an attacker that can forge proofs controls the randomness, and thus can do things like attaching a pre-computed chain to the current one in order to do a double spending attack with only little resources.
- 4.
- 5.
Note that the delay functions in the RSA group and class groups of imaginary quadratic field lose their sequentiality property in the quantum setting since the order of these groups can be efficiently computed.
- 6.
The observation that random batching can be attacked using low-order elements was already made in [12].
- 7.
If the (malicious) prover does not cheat on the modified statement, the verifier will anyway catch it during the final exponentiation.
- 8.
The case where \(T-C\) is not a power of 2 can be handled by a standard approach similar to [40, Section 3.1].
- 9.
To be precise, it suffices for the soundness of the PoE to be based on a hardness assumption that is at most as strong as the hardness assumption that is used for showing the binding or knowledge soundness of the polynomial commitment.
References
Abusalah, H., Kamath, C., Klein, K., Pietrzak, K., Walter, M.: Reversible proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part II. LNCS, vol. 11477, pp. 277–291. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17656-3_10
Arun, A., Ganesh, C., Lokam, S., Mopuri, T., Sridhar, S.: Dew: transparent constant-sized zkSNARKs. Cryptology ePrint Archive, Paper 2022/419 (2022). https://eprint.iacr.org/2022/419
Belabas, K., Kleinjung, T., Sanso, A., Wesolowski, B.: A note on the low order assumption in class group of an imaginary quadratic number fields. Cryptology ePrint Archive, Paper 2020/1310 (2020). https://eprint.iacr.org/2020/1310
Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236–250. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054130
Beller, M.J., Yacobi, Y.: Batch Diffie-Hellman key agreement systems and their application to portable communications. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 208–220. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-47555-9_19
Bitansky, N., Goldwasser, S., Jain, A., Paneth, O., Vaikuntanathan, V., Waters, B.: Time-lock puzzles from randomized encodings. In: Sudan, M. (ed.) Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, 14–16 January 2016, pp. 345–356. ACM (2016)
Block, A.R., Holmgren, J., Rosen, A., Rothblum, R.D., Soni, P.: Time- and space-efficient arguments from groups of unknown order. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021, Part IV. LNCS, vol. 12828, pp. 123–152. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_5
Blocki, J., Lee, S., Zhou, S.: On the security of proofs of sequential work in a post-quantum world. In: Tessaro, S. (ed.) 2nd Conference on Information-Theoretic Cryptography, ITC 2021, 23–26 July 2021, Virtual Conference. LIPIcs, vol. 199, pp. 22:1–22:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021)
Boneh, D., Bonneau, J., Bünz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018, Part I. LNCS, vol. 10991, pp. 757–788. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96884-1_25
Boneh, D., Bünz, B., Fisch, B.: A survey of two verifiable delay functions. IACR Cryptology ePrint Archive 2018:712 (2018)
Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236–254. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_15
Boyd, C., Pavlovski, C.: Attacking and repairing batch verification schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 58–71. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44448-3_5
Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. J. Cryptol. 1(2), 107–118 (1988). https://doi.org/10.1007/BF02351719
Bünz, B., Fisch, B., Szepieniec, A.: Transparent SNARKs from DARK compilers. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part I. LNCS, vol. 12105, pp. 677–706. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45721-1_24
Cai, J., Lipton, R.J., Sedgewick, R., Yao, A.C.: Towards uncheatable benchmarks. In: 1993 Proceedings of the Eighth Annual Structure in Complexity Theory Conference, pp. 2–11, May 1993
Chavez-Saab, J., Henríquez, F.R., Tibouchi, M.: Verifiable isogeny walks: towards an isogeny-based postquantum VDF. Cryptology ePrint Archive, Report 2021/1289 (2021). https://ia.cr/2021/1289
Chen, M., et al.: Multiparty generation of an RSA modulus. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 64–93. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_3
Choudhuri, A.R., Hubáček, P., Kamath, C., Pietrzak, K., Rosen, A., Rothblum, G.N.: PPAD-hardness via iterated squaring modulo a composite. Cryptology ePrint Archive, Report 2019/667 (2019). https://ia.cr/2019/667
Cohen, B., Pietrzak, K.: Simple proofs of sequential work. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018, Part II. LNCS, vol. 10821, pp. 451–467. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78375-8_15
Döttling, N., Garg, S., Malavolta, G., Vasudevan, P.N.: Tight verifiable delay functions. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 65–84. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-57990-6_4
Döttling, N., Lai, R.W.F., Malavolta, G.: Incremental proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part II. LNCS, vol. 11477, pp. 292–323. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17656-3_11
Dummit, D.S., Foote, R.M.: Abstract Algebra, 3rd edn. Wiley, Hoboken (2003)
Ephraim, N., Freitag, C., Komargodski, I., Pass, R.: Continuous verifiable delay functions. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part III. LNCS, vol. 12107, pp. 125–154. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_5
Erdõs, P.: Beweis eines satzes von Tschebyschef (on a proof of a theorem of Chebyshev, in German). Acta Litt. Sci. Szeged 5, 194–198 (1932)
De Feo, L., Masson, S., Petit, C., Sanso, A.: Verifiable delay functions from supersingular isogenies and pairings. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part I. LNCS, vol. 11921, pp. 248–277. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_10
Fiat, A.: Batch RSA. J. Cryptol. 10(2), 75–88 (1997). https://doi.org/10.1007/s001459900021
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
Frederiksen, T.K., Lindell, Y., Osheter, V., Pinkas, B.: Fast distributed RSA key generation for semi-honest and malicious adversaries. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018, Part II. LNCS, vol. 10992, pp. 331–361. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_12
Freitag, C., Komargodski, I.: The cost of statistical security in interactive proofs for repeated squaring. Cryptology ePrint Archive, Paper 2022/766 (2022). https://eprint.iacr.org/2022/766
Freitag, C., Komargodski, I., Pass, R., Sirkin, N.: Non-malleable time-lock puzzles and applications. In: Nissim, K., Waters, B. (eds.) TCC 2021, Part III. LNCS, vol. 13044, pp. 447–479. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90456-2_15
Hoffmann, C., Hubáček, P., Kamath, C., Klein, K., Pietrzak, K.: Practical statistically-sound proofs of exponentiation in any group. Cryptology ePrint Archive, Report 2022/??? (2022)
Katz, J., Loss, J., Xu, J.: On the security of time-lock puzzles and timed commitments. In: Pass, R., Pietrzak, K. (eds.) TCC 2020, Part III. LNCS, vol. 12552, pp. 390–413. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64381-2_14
Lenstra, A.K., Wesolowski, B.: Trustworthy public randomness with sloth, unicorn, and trx. Int. J. Appl. Cryptogr. 3(4), 330–343 (2017)
Lombardi, A., Vaikuntanathan, V.: Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 632–651. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_22
Mahmoody, M., Moran, T., Vadhan, S.: Time-lock puzzles in the random oracle model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 39–50. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_3
Mahmoody, M., Moran, T., Vadhan, S.P.: Publicly verifiable proofs of sequential work. In: Kleinberg, R.D. (ed.) Innovations in Theoretical Computer Science, ITCS 2013, Berkeley, CA, USA, 9–12 January 2013, pp. 373–388. ACM (2013)
Mahmoody, M., Smith, C., Wu, D.J.: Can verifiable delay functions be based on random oracles? In: ICALP. LIPIcs, vol. 168, pp. 83:1–83:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2020)
May, T.C.: Timed-release crypto (1994)
M’Raïhi, D., Naccache, D.: Batch exponentiation: a fast DLP-based signature generation strategy. In: Gong, L., Stearn, J. (eds.) CCS 1996, Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14–16 March 1996, pp. 58–61. ACM (1996)
Pietrzak, K.: Simple verifiable delay functions. In: Blum, A. (ed.) 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, San Diego, California, USA, 10–12 January 2019. LIPIcs, vol. 124, pp. 60:1–60:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2019)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA (1996)
Rotem, L.: Simple and efficient batch verification techniques for verifiable delay functions. In: Nissim, K., Waters, B. (eds.) TCC 2021, Part III. LNCS, vol. 13044, pp. 382–414. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90456-2_13
Rotem, L., Segev, G.: Generically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functions. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part III. LNCS, vol. 12172, pp. 481–509. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56877-1_17
Rotem, L., Segev, G., Shahaf, I.: Generic-group delay functions require hidden-order groups. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part III. LNCS, vol. 12107, pp. 155–180. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_6
Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., Weippl, E.R.: RandRunner: distributed randomness from trapdoor VDFs with strong uniqueness. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21–25 February 2021. The Internet Society (2021)
Shani, B.: A note on isogeny-based hybrid verifiable delay functions. Cryptology ePrint Archive, Report 2019/205 (2019). https://ia.cr/2019/205
Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1–18. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78524-8_1
van Baarsen, A., Stevens, M.: On time-lock cryptographic assumptions in abelian hidden-order groups. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part II. LNCS, vol. 13091, pp. 367–397. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-92075-3_13
Wesolowski, B.: Efficient verifiable delay functions. J. Cryptol. 33, 2113–2147 (2020)
Wesolowski, B., Williams, R.: Lower bounds for the depth of modular squaring. Cryptology ePrint Archive, Report 2020/1461 (2020). https://ia.cr/2020/1461
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Improving Verifier’s Efficiency
In Fig. 2 we see that for large values of B and q the verifier’s complexity increases because the final computation \((y')^{q^C}\) becomes expensive. The cost of this computation is \(C\cdot \log (q)\), where so far we have set \(C=t\log (B)\). We can reduce this number to \(C=t\log (B)/2\) by setting q to
It is straightforward to check that this does not affect our soundness bound, but it has a notable effect on verifier’s efficiency as shown in Fig. 6.
Number of multiplications of the verifier in one round for 80-bit security depending on the bound \(B\). The blue line is the number of multiplications in [7], the dotted orange graph is the complexity of our protocol with \(C=t\log (B)\), the red graph is the complexity in our protocol with \(C=t\log (B)/2\) and the green line is the verifier’s complexity in [40]. (Color figure online)
This approach can be generalized to setting \(C=t\log (B)/k\) for any integer \(k\le \log (B)\). To ensure soundness we need to modify q as follows: Let m be the largest prime number such that \(m<2^k\). Then we set
In particular, the choice of q that optimizes verifier’s efficiency for large values of B is
for which we can set \(C=t\). The cost for the verifier with this parameters is shown in Fig. 7. We conclude that the verifier’s complexity of our scheme improves upon [7] for values of B from 59 up to 2749, which corresponds to values of q between approximately \(2^{71}\) and \(2^{400\cdot \log (2749)}\approx 2^{3167}\).
Number of multiplications of the verifier in one round for 80-bit security depending on the bound \(B\). The dotted blue line is the number of multiplications in [7], the orange graph is the complexity of our protocol with \(C=t\) and q as above and the green line is verifier’s complexity in [40] (which is 240 multiplications). (Color figure online)
B Application in Polynomial Commitments
In this section we analyse the gain in efficiency when we use our PoE as a building block instead of the one proposed in [7].
In the full version of the paper [31] we provide an overview of the polynomial commitment scheme in [7]. Here we only state the key properties that the PoE should satisfy in order to be applicable in the polynomial commitment scheme.
Requirements from the PoE. Note that the use of the PoE in the [7] polynomial commitment is more or less black-box. However, there are two important criteria that it should satisfy.
-
1.
Firstly, the PoE has to satisfy statistical soundness so that the knowledge soundness of the polynomial commitment built upon it can be argued ([7, Lemma 6.4]).Footnote 9 Our PoE satisfies statistical soundness.
-
2.
Secondly, the base \(q\) used in the PoE protocol is borrowed from the polynomial commitment. In order for the polynomial commitment to satisfy its homomorphic properties, [7] set it to be a large, odd integer – in particular, they require \(q\gg p\cdot 2^{n\textbf{poly} (\lambda )}\). This requirement that \(q\) be large, as we saw in Sect. 2 is advantageous for our PoE. On the other hand, the requirement that \(q\) be odd is in conflict with our trick of choosing an even \(q\) as in Eq. (1). However, we show in the full version of the paper [31] that the requirement that \(q\) be odd is not necessary in [7].
1.1 B.1 Efficiency
In this section we analyze the improvement in efficiency of the polynomial commitment scheme in [7] using our PoE, the batching protocol and the optimization in Appendix A. In the polynomial commitment scheme the PoE protocol is used to prove statements of the form \(x_i^{q^{2^{n-k-1}}}=y_i\) for every \(i\in \left[ \lambda \right] \) and every \(k\in \{0,1,\ldots ,n-1\}\).
Communication Complexity. In [7] the communication complexity of proving \(\lambda \) many statements with the same exponent is \(\lambda (n-k-1)\) group elements. This gives a total PoE proof-size of
As we have seen in Sect. 3.2, in our PoE the cost of proving \(\lambda n\) statements, in which the largest exponent is \(q^{n-1}\), is
We conclude that we decrease the proof-size of the polynomial commitment by a factor of approximately \(n/(2\log ^*(n-1))\). This number can be increased to n/2 at the cost of a higher verifier complexity. More generally, the number of recursive steps explained in Sect. 3.2 can be used to choose a trade-off between proof-size and verifier efficiency.
Verifier’s Efficiency. In [7] the verifier’s complexity of proving \(\lambda \) many statements with the same exponent is \(2\lambda ^2 (n-k-1)+\lambda \log (q)\) multiplications. This gives a total verifier’s complexity of
As we have seen in Sect. 3.2, in our PoE the cost of verifying \(\lambda n\) statements, in which the largest exponent is \(q^{n-1}\), is
Since in practice we have \(n\approx 32\), we conclude that the verifier’s efficiency of the polynomial commitment scheme implemented with our PoE is comparable to that in [7].
Rights and permissions
Copyright information
© 2022 International Association for Cryptologic Research
About this paper
Cite this paper
Hoffmann, C., Hubáček, P., Kamath, C., Klein, K., Pietrzak, K. (2022). Practical Statistically-Sound Proofs of Exponentiation in Any Group. In: Dodis, Y., Shrimpton, T. (eds) Advances in Cryptology – CRYPTO 2022. CRYPTO 2022. Lecture Notes in Computer Science, vol 13508. Springer, Cham. https://doi.org/10.1007/978-3-031-15979-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-15979-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15978-7
Online ISBN: 978-3-031-15979-4
eBook Packages: Computer ScienceComputer Science (R0)