2022
DOI: 10.1007/s10623-022-01135-y
|View full text |Cite
|
Sign up to set email alerts
|

A survey of elliptic curves for proof systems

Abstract: Elliptic curves have become key ingredients for instantiating zero-knowledge proofs and more generally proof systems. Recently, there have been many tailored constructions of these curves that aim at efficiently implementing different kinds of proof systems. In this survey we provide the reader with a comprehensive overview on existing work and revisit the contributions in terms of efficiency and security. We present an overview at three stages of the process: curves to instantiate a SNARK, curves to instantia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…In the sequel we will focus on the case of BLS12 inner curves that form a 2-chain but we stress that these results apply to 2-chain inner curves from other families (e.g. BLS24 and BN [AHG22]) and to 2-cycles as well.…”
Section: -Cyclesmentioning
confidence: 99%
“…In the sequel we will focus on the case of BLS12 inner curves that form a 2-chain but we stress that these results apply to 2-chain inner curves from other families (e.g. BLS24 and BN [AHG22]) and to 2-cycles as well.…”
Section: -Cyclesmentioning
confidence: 99%
“…The first one was written in C++ and used previously in the Mina blockchain but is now obsolete as these MNT4/6 curves are quite inefficient at the 128-bit security level. More discussion on this can be found in this survey paper [3,Section 5]. The second implementation is in Rust and corresponds exactly to the problem we investigate in this paper.…”
Section: Implementation and Benchmarkmentioning
confidence: 99%
“…A pairing on an elliptic curve E defined over a prime field F p is a non-degenerate bilinear map of the form e : G 1 × G 2 → G T , where G 1 , G 2 and G T are three groups with the same order r. The two input groups G 1 and G 2 lie in E(F p k ) and the output group G T is a subgroup of F * p k , where k is the smallest positive integer such that r | p k − 1. Taking advantage of the powerful bilinearity property of pairings, a range of cryptographic protocols are designed, such as authenticated key agreements [CK03,Sco13], direct anonymous attestation (DAA) [BCC04, YCZ + 21] and Succinct Non-interactive ARguments of Knowledge (SNARKs) [EHG22,EHG20,AEHG22]. Very recently, pairings were also used to speed up group membership testing on several non-pairing-friendly curves [Kos22].…”
Section: Introductionmentioning
confidence: 99%