2013
DOI: 10.1007/978-3-642-38348-9_38
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists

Abstract: Abstract. Verification of a polynomial's evaluation in a secret committed value plays a role in cryptographic applications such as non-membership or membership proofs. We construct a novel special honest verifier zero-knowledge argument for correct polynomial evaluation. The argument has logarithmic communication cost in the degree of the polynomial, which is a significant improvement over the state of the art with cubic root complexity at best. The argument is relatively efficient to generate and very fast to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
45
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(46 citation statements)
references
References 41 publications
1
45
0
Order By: Relevance
“…This efficiency compares favorably with the membership proof in Bayer and Groth [BG13]. They prove membership by demonstrating the committed value is a root in the polynomial P (u) = N −1 i=0 (u − λ i ) but the initial step of computing the coefficients of the polynomial requires O(N log 2 N ) multiplications (and only if the modulus q is of a form suitable for using the Fast Fourier Transform).…”
Section: The Verifier's Computation Is Dominated By the Multi-exponenmentioning
confidence: 70%
See 2 more Smart Citations
“…This efficiency compares favorably with the membership proof in Bayer and Groth [BG13]. They prove membership by demonstrating the committed value is a root in the polynomial P (u) = N −1 i=0 (u − λ i ) but the initial step of computing the coefficients of the polynomial requires O(N log 2 N ) multiplications (and only if the modulus q is of a form suitable for using the Fast Fourier Transform).…”
Section: The Verifier's Computation Is Dominated By the Multi-exponenmentioning
confidence: 70%
“…, c N −1 we get very efficient computation of 2N log N and 2N multiplications in Z q for the prover and verifier, respectively. This is an improvement over the membership proofs of Bayer and Groth [BG13] that use O(N log 2 N ) multiplications for both the prover and verifier.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…The linear dependence on M in the efficiency of our zeroknowledge proof of knowledge protocol can be reduced to √ M or even log(M ), by using the techniques in [21,3] for the polynomial evaluation part of the resulting zero-knowledge proof of knowledge.…”
Section: A Variation With Better Efficiencymentioning
confidence: 99%
“…In the M central blocks of columns of A (3) , with Vandermonde vectors, we can reorder the rows in order to get (1, . .…”
Section: A Proof Of Lemmamentioning
confidence: 99%