Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134068
|View full text |Cite
|
Sign up to set email alerts
|

New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs

Abstract: Bilinear groups form the algebraic setting for a multitude of important cryptographic protocols including anonymous credentials, e-cash, e-voting, e-coupon, and loyalty systems. It is typical of such crypto protocols that participating parties need to repeatedly verify that certain equations over bilinear groups are satisfied, e.g., to check that computed signatures are valid, commitments can be opened, or non-interactive zero-knowledge proofs verify correctly. Depending on the form and number of equations thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…In the most efficient instantiation, the proof size is (3d + 2)|G 1 | + (d + 2)|G 2 | and naive verification requires to compute 3d pairings for the quadratic relations and 2(n 0 + 3d + 4) for the linear part, n d exponentiations in G 1 for the output. Using the "bilinear batching" techniques of Herold et al [21] the number of pairings can be reduced to n 0 + 3d + 4 for the linear part. Since the input is known in Z p , n 0 pairings in this part can be replaced by n 0 exponentiations in G T .…”
Section: Efficiencymentioning
confidence: 99%
See 1 more Smart Citation
“…In the most efficient instantiation, the proof size is (3d + 2)|G 1 | + (d + 2)|G 2 | and naive verification requires to compute 3d pairings for the quadratic relations and 2(n 0 + 3d + 4) for the linear part, n d exponentiations in G 1 for the output. Using the "bilinear batching" techniques of Herold et al [21] the number of pairings can be reduced to n 0 + 3d + 4 for the linear part. Since the input is known in Z p , n 0 pairings in this part can be replaced by n 0 exponentiations in G T .…”
Section: Efficiencymentioning
confidence: 99%
“…First, one can observe that in fact since the input is known in Z p , the n 0 pairings can be replaced by exponentiations in G T . Second, using the "bilinear batching" techniques of [21] this is reduced to 7d + 3d + 4. Finally, using traditional batching techniques [6], the cost of verifying all the to GS equations can be reduced to d + 6, resulting in a total cost of 4d + 10 pairings (and O(n 0 + d) exponentiations).…”
Section: Adding Zero-knowledgementioning
confidence: 99%
“…For decryption, we need to check the equations. Using the probabilistic verification of [Her+17], we can reduce the number of pairings needed to compute to rougly 22 for NYUE and 29 for NYUE. We ignore the additional overhead, which is one (small) exponentiation per commitment and several per proof.…”
Section: Compilation For Nyue We Have Following Typed Equationsmentioning
confidence: 99%
“…For the verification of NIZK proofs, we assume batch verification techniques from (Herold et al 2017) to significantly speed up the verification process. Also note, that the number of operations needed for verification was generously estimated.…”
Section: Efficiencymentioning
confidence: 99%