UC-Secure CRS Generation for SNARKs

Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zajac

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Zero-knowledge SNARKs (zk-SNARKs) have recently found various applications in verifiable computation and blockchain applications (Zerocash), but unfortunately they rely on a common reference string (CRS) that has to be generated by a trusted party. A standard suggestion, pursued by Ben Sasson et al. [IEEE SP, 2015], is to generate CRS via a multi-party protocol. We enhance their CRS-generation protocol to achieve UC-security. This allows to safely compose the CRS-generation protocol with the zk-SNARK in a black-box manner with the insurance that the security of the zk-SNARK is not influenced. Differently from the previous work, the new CRS-generation protocol also avoids the random oracle model which is typically not required by zk-SNARKs themselves. As a case study, we apply the protocol to the state-of-the-art zk-SNARK by Groth [EUROCRYPT, 2016].
Original languageEnglish
Title of host publicationProgress in Cryptology -- AFRICACRYPT 2019
EditorsJohannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi
Place of PublicationCham
PublisherSpringer
Pages99-117
Number of pages19
ISBN (Electronic)978-3-030-23696-0
ISBN (Print)978-3-030-23695-3
DOIs
Publication statusPublished - 29 Jun 2019
Event11th International Conference on Cryptology 2019 - Rabat, Morocco
Duration: 9 Jul 201911 Jul 2019
https://africacrypt2019.aui.ma/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer, Cham
Volume11627
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Cryptology 2019
Abbreviated titleAFRICACRYPT 2019
Country/TerritoryMorocco
CityRabat
Period9/07/1911/07/19
Internet address

Fingerprint

Dive into the research topics of 'UC-Secure CRS Generation for SNARKs'. Together they form a unique fingerprint.

Cite this