TY  - GEN
N1  - This version is the author accepted manuscript. For information on re-use, please refer to the publisher?s terms and conditions.
SP  - 595
A1  - Bootle, J
A1  - Cerulli, A
A1  - Groth, J
A1  - Jakobsen, S
A1  - Maller, M
SN  - 0302-9743
UR  - https://doi.org/10.1007/978-3-030-03326-2_20
EP  - 626
AV  - public
Y1  - 2018/10/27/
TI  - Arya: Nearly linear-time zero-knowledge proofs for correct program execution
KW  - Zero-knowledge proofs
KW  -  Succinct arguments of knowledge
KW  -  TinyRAM
KW  -  Ideal linear commitments
KW  -  Post-quantum security
T3  - Lecture Notes in Computer Science (LNCS)
CY  - Cham, Switzerland
PB  - Springer
ID  - discovery10063978
N2  - There have been tremendous advances in reducing interaction, communication and verification time in zero-knowledge proofs but it remains an important challenge to make the prover efficient. We construct the first zero-knowledge proof of knowledge for the correct execution of a program on public and private inputs where the prover computation is nearly linear time. This saves a polylogarithmic factor in asymptotic performance compared to current state of the art proof systems.

We use the TinyRAM model to capture general purpose processor computation. An instance consists of a TinyRAM program and public inputs. The witness consists of additional private inputs to the program. The prover can use our proof system to convince the verifier that the program terminates with the intended answer within given time and memory bounds. Our proof system has perfect completeness, statistical special honest verifier zero-knowledge, and computational knowledge soundness assuming linear-time computable collision-resistant hash functions exist. The main advantage of our new proof system is asymptotically efficient prover computation. The prover?s running time is only a superconstant factor larger than the program?s running time in an apples-to-apples comparison where the prover uses the same TinyRAM model. Our proof system is also efficient on the other performance parameters; the verifier?s running time and the communication are sublinear in the execution time of the program and we only use a log-logarithmic number of rounds.
ER  -