CDS Composition of Multi-round Protocols | SpringerLink
Skip to main content

CDS Composition of Multi-round Protocols

  • Conference paper
  • First Online:
Advances in Cryptology – CRYPTO 2024 (CRYPTO 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14928))

Included in the following conference series:

  • 909 Accesses

Abstract

We revisit the Cramer, Damgård, Schoenmakers (CDS) approach for composing sigma protocols, and adapt it to a setting in which the underlying protocols have multiple rounds of interaction. The goal of CDS composition is to prove compound NP-relations by combining multiple “atomic” proof systems. Its key feature is that it interacts with the atomic proofs in a generic fashion, enabling simpler and more efficient implementation.

Recent developments in multi-round protocols call for the adaptation of CDS composition beyond its original scope, which not only was restricted to three-move protocols but in fact fails in the multi-round case, as well as in the composition of so-called k-special sound proofs.

We propose a new method for multi-round composition in the plain model, in a soundness preserving way and with an “offline” zero-knowledge simulation property. The need for handling arbitrary monotone access structures in \(\textsf{mNC}^1\), which is all Boolean function families represented by polynomial-size formulas over some fixed complete basis, leads us to identify a complexity theoretic problem of independent interest.

Prior to our work, multi-round composition was either restricted to the random oracle model, or worked only for argument systems, and moreover required heavy “online” zero-knowledge simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 14871
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 10581
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abe, M., Ambrona, M., Bogdanov, A., Ohkubo, M., Rosen, A.: Non-interactive composition of sigma-protocols via share-then-hash. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12493, pp. 749–773. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64840-4_25

    Chapter  Google Scholar 

  2. Abe, M., Ambrona, M., Bogdanov, A., Ohkubo, M., Rosen, A.: Acyclicity programming for sigma-protocols. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 435–465. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_15

    Chapter  Google Scholar 

  3. Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 415–432. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_26

    Chapter  Google Scholar 

  4. Ajtai, M., Komlós, J., Szemerédi, E.: An \(o(n log n)\) sorting network. In: STOC ’83: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 1–9. ACM Press, New York (1983)

    Google Scholar 

  5. Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 2087–2104. ACM (2017)

    Google Scholar 

  6. Attema, T., Cramer, R., Fehr, S.: Compressing proofs of k-Out-Of-n partial knowledge. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 65–91. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_3

    Chapter  Google Scholar 

  7. Attema, T., Cramer, R., Kohl, L.: A compressed \(\sigma \)-protocol theory for lattices. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12826, pp. 549–579. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84245-1_19

  8. Attema, T., Fehr, S.: Parallel repetition of (\(k_1, \dots , k_{\mu }\))-special-sound multi-round interactive proofs. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part I. LNCS, vol. 13507, pp. 415–443. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_15

  9. Attema, T., Fehr, S., Resch, N.: Generalized special-sound interactive proofs and their knowledge soundness. In: Rothblum, G., Wee, H. (eds.) TCC 2023, Part III. LNCS, vol. 14371, pp. 424–454. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-48621-0_15

  10. Avitabile, G., Botta, V., Friolo, D., Visconti, I.: Efficient proofs of knowledge for threshold relations. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS 2022, Part III. LNCS, vol. 13556, pp. 42–62. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17143-7_3

  11. Baum, C., Malozemoff, A.J., Rosen, M.B., Scholl, P.: \(\sf Mac^{\prime }n^{\prime }Cheese\): zero-knowledge proofs for boolean and arithmetic circuits with nested disjunctions. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 92–122. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_4

    Chapter  Google Scholar 

  12. Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Fast reed-solomon interactive oracle proofs of proximity. In: 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018, July 9-13, 2018, Prague, Czech Republic. LIPIcs, vol. 107, pp. 14:1–14:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2018)

    Google Scholar 

  13. Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27–35. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_3

    Chapter  Google Scholar 

  14. Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 243–265. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24174-6_13

    Chapter  Google Scholar 

  15. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 315–334. IEEE Computer Society (2018)

    Google Scholar 

  16. Bünz, B., Fisch, B., Szepieniec, A.: Transparent SNARKs from DARK compilers. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 677–706. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45721-1_24

    Chapter  Google Scholar 

  17. Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., Visconti, I.: Improved OR-composition of sigma-protocols. In: Kushilevitz, E., Malkin, T. (eds.) TCC 2016. LNCS, vol. 9563, pp. 112–141. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49099-0_5

    Chapter  Google Scholar 

  18. Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., Visconti, I.: Online/offline OR composition of sigma protocols. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 63–92. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_3

    Chapter  Google Scholar 

  19. Cramer, R.: Modular Design of Secure yet Practical Cryptographic Protocols. Ph.D. thesis, University of Amsterdam (1997)

    Google Scholar 

  20. Cramer, R., Damgård, I., MacKenzie, P.: Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 354–372. Springer, Heidelberg (2000). https://doi.org/10.1007/978-3-540-46588-1_24

    Chapter  Google Scholar 

  21. Cramer, R., Damgård, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316–334. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45539-6_22

    Chapter  Google Scholar 

  22. Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_19

    Chapter  Google Scholar 

  23. Don, J., Fehr, S., Majenz, C., Schaffner, C.: Efficient nizks and signatures from commit-and-open protocols in the QROM. In: CRYPTO 2022, Part II. LNCS, vol. 13508, pp. 729–757. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15979-4_25

  24. Don, J., Fehr, S., Majenz, C., Schaffner, C.: Online-extractability in the quantum random-oracle model. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part III. LNCS, vol. 13277, pp. 677–706. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07082-2_24

  25. Feng, H., Liu, J., Wu, Q., Li, Y.-N.: Traceable ring signatures with post-quantum security. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 442–468. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40186-3_19

    Chapter  Google Scholar 

  26. Fischlin, M., Harasser, P., Janson, C.: Signatures from sequential-OR proofs. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12107, pp. 212–244. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_8

    Chapter  Google Scholar 

  27. Fouque, P., Georgescu, A., Qian, C., Roux-Langlois, A., Wen, W.: A generic transform from multi-round interactive proof to NIZK. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC 2023, Part II. LNCS, vol. 13941, pp. 461–481. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-31371-4_16

  28. Goel, A., Green, M., Hall-Andersen, M., Kaptchuk, G.: Stacking sigmas: a framework to compose \(\varSigma \)-protocols for disjunctions. IACR Cryptol. ePrint Arch., p. 422 (2021)

    Google Scholar 

  29. Goel, A., Green, M., Hall-Andersen, M., Kaptchuk, G.: Stacking sigmas: A framework to compose \(\Sigma \)-protocols for disjunctions. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part II. LNCS, vol. 13276, pp. 458–487. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07085-3_16

  30. Goel, A., Hall-Andersen, M., Kaptchuk, G., Spooner, N.: Speed-stacking: fast sublinear zero-knowledge proofs for disjunctions. In: EUROCRYPT 2023, Part II. LNCS, vol. 14005, pp. 347–378. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-30617-4_12

  31. Grigni, M., Sipser, M.: Monotone complexity. In: Proceedings of the London Mathematical Society Symposium on Boolean Function Complexity. pp. 57–75. Cambridge University Press, USA (1992)

    Google Scholar 

  32. Groth, J., Kohlweiss, M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 253–280. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_9

    Chapter  Google Scholar 

  33. Heath, D., Kolesnikov, V.: Stacked garbling for disjunctive zero-knowledge proofs. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12107, pp. 569–598. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45727-3_19

    Chapter  Google Scholar 

  34. Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 21–30. ACM (2007)

    Google Scholar 

  35. Kattis, A.A., Panarin, K., Vlasov, A.: Redshift: transparent snarks from list polynomial commitments. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7–11, 2022, pp. 1725–1737. ACM (2022)

    Google Scholar 

  36. Katz, J., Kolesnikov, V., Wang, X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15–19 October, 2018, pp. 525–537. ACM (2018)

    Google Scholar 

  37. Kim, A., Liang, X., Pandey, O.: A new approach to efficient non-malleable zero-knowledge. In: Chung, Y., Yung, M. (eds.) CRYPTO 2022, Part IV. LNCS, vol. 13510, pp. 389–418. Springer, Cham (2022). https://doi.org/10.1007/978-3-642-17955-6_3

  38. Lindell, Y.: An efficient transform from sigma protocols to NIZK with a CRS and non-programmable random oracle. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9014, pp. 93–109. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46494-6_5

    Chapter  Google Scholar 

  39. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  40. Valiant, L.: Short monotone formulae for the majority function. J. Algorithms 5(3), 363–366 (1984)

    Article  MathSciNet  Google Scholar 

  41. Wikström, D.: Special soundness revisited. Cryptology ePrint Archive, Paper 2018/1157 (2018). https://eprint.iacr.org/2018/1157

  42. Wikström, D.: Special soundness in the random oracle model. Cryptology ePrint Archive, Paper 2021/1265 (2021). https://eprint.iacr.org/2021/1265

  43. Zeng, G., Lai, J., Huang, Z., Wang, Y., Zheng, Z.: Dag-\(\varSigma \): A dag-based sigma protocol for relations in CNF. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT 2022, Part II. LNCS, vol. 13792, pp. 340–370. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-22966-4_12

Download references

Acknowledgements

We are grateful to Siyao Guo for useful advice and anonymous reviewers from Eurocrypt 2024 and Crypto 2024 for helpful comments. Work supported by European Research Council (ERC) under the EU’s Horizon 2020 research and innovation programme (Grant agreement No. 101019547) and Cariplo CRYPTONOMEX grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zehua Shang .

Editor information

Editors and Affiliations

A Dual-Mode Commitment Scheme from DDH

A Dual-Mode Commitment Scheme from DDH

This section presents an instantiation of a dual-mode commitment scheme associated with a \(\mathsf {\varSigma }\)-protocol for proving correct generation of a binding key. We first describe the dual-mode commitment scheme taken from [38] with a modification that the prover generates the public parameters, \((\mathbb {G}, q, g)\), and chooses a random generator h by itself while they are given as a common reference string in [38]. This results in losing the original computational binding property in the hiding mode, which we do not need in our construction. It is noted that it does not spoil the computational hiding property in the binding mode as well as the mode indistinguishability where the adversary is the verifier. We instantiate \(\textsf{dmCom}= \{\ensuremath {\textsf{CGen}_{\textsf{BIND}}}, \ensuremath {\textsf{CGen}_{\textsf{HIDE}}}, \ensuremath {\textsf{Com}}, \ensuremath {\textsf{Eqv}}\}\) as follows:

  • \(\ensuremath {\textsf{CGen}_{\textsf{BIND}}}(\ensuremath {1^\ensuremath {\lambda }})\rightarrow \ensuremath {\textsf{ck}}\): Run \((\mathbb {G}, q, g) \leftarrow \mathcal{G}(\ensuremath {1^\ensuremath {\lambda }})\). Choose , and . Compute \(u = g^{\rho _1}\) and \(v = g^{\rho _2}\), and output \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\).

  • \(\ensuremath {\textsf{CGen}_{\textsf{HIDE}}}(\ensuremath {1^\ensuremath {\lambda }})\rightarrow (\ensuremath {\textsf{ck}},\ensuremath {\textsf{td}})\): As above, except for choosing , and computing \(u = g^{\rho }\), and \(v = h^{\rho }\). Output \(\ensuremath {\textsf{ck}}: = (\mathbb {G}, q, g, h, u, v)\), and \(\ensuremath {\textsf{td}}:= \rho \).

  • \(\ensuremath {\textsf{Com}}_\ensuremath {\textsf{ck}}(m;r) \rightarrow \ensuremath {\textsf{com}}\): Choose and compute \(a = g^r / u^m\) and \(b = h^r / v^m\). Output \(\ensuremath {\textsf{com}}:= (a, b)\).

  • \(\ensuremath {\textsf{Eqv}}_\ensuremath {\textsf{td}}(\ensuremath {\textsf{com}},\ensuremath {\textsf{ck}}, m', r', m)\rightarrow r\): Take \(\rho \) from \(\ensuremath {\textsf{td}}\) and output \(r := (r' - \rho m') + \rho m\).

Theorem 10

The above \(\textsf{dmCom}\) is a dual-mode commitment scheme. It is perfectly binding in the binding mode, and equivocal in the hiding mode. It is mode indistinguishable and computationally hiding in the binding mode under the decision Diffie-Hellman assumption relative to \(\mathcal G\).

Proof

For a commitment, (ab), let \(\tilde{a} := \log _g a\), \(\tilde{b} := \log _h b\) and \(x := \log _g h\). We first show that \(\textsf{dmCom}\) is perfectly binding in the binding mode. From \(a = g^r / u^m\) and \(b = h^r / v^m\), we have \(\tilde{a} = r + \rho _1 m\) and \(\tilde{b} = r + \rho _2 m\). Since \(\rho _1 \ne \rho _2\), they determine \(m \in \ensuremath {\mathbb {Z}}_q\) uniquely by \(m = (\tilde{a} - \tilde{b}) / (\rho _1 - \rho _2)\). To show that commitments are computationally hiding in the binding mode under the DDH assumption, consider two distributions, C(m) and R, over variables (ghuvab) that (ghuv) is generated by \(\ensuremath {\textsf{CGen}_{\textsf{BIND}}}(\ensuremath {1^\ensuremath {\lambda }})\), and (ab) for C(m) is generated by \(\ensuremath {\textsf{Com}}_\ensuremath {\textsf{ck}}(m)\) with \(\ensuremath {\textsf{ck}}: = (\mathbb {G}, q, g, h, u, v)\), and (ab) for R is uniform over \(\mathbb {G}^2\). We then set up the following hybrid. For a given DDH question \(Q:=(g, g^r, h, h^{r'})\) and message m, let and \((a,b) := ((g^r) / u^m, (h^{r'}) / v^m)\). If Q is taken from the DDH distribution where \(r=r'\), (ghuvab) is in C(m). On the other hand, if Q is taken from the random distribution where \(r \ne r'\), (ghuvab) is in R. Thus, distinguishing C(m) and R is hard under the DDH assumption. For \(m' (\ne m)\), \(C(m')\) and R are indistinguishable for the same reason. Thus, for any m and \(m'\), two distributions C(m) and \(C(m')\) are indistinguishable under the DDH assumption.

We next show that \(\textsf{dmCom}\) is perfectly hiding in the hiding mode. Since \(u = g^{\rho }\) and \(v = h^{\rho }\), we have \(\tilde{a} = \tilde{b} = r - \rho m\). Thus, for any \(m'\), there exists \(r'\) that satisfies \(\tilde{a} = \tilde{b} = r' - \rho m'\). Therefore, (rm) is perfectly hiding.

Mode indistinguishability is directly from the DDH assumption. The quadruple (ghuv) in a hiding key is in the DDH distribution, and the one in a binding key is in the uniform distribution. Thus, they are indistinguishable under the DDH assumption.

Finally, equivocality is verified by inspecting that \(r' = (r - \rho m) + \rho m'\) satisfies \(a = g^r / u^m = g^{r'} / u^{m'}\) and \(b = h^r / v^m = h^{r'} / v^{m'}\).

   \(\square \)

We present a \(\mathsf {\varSigma }\)-protocol \(\varPi ^{\textsf{bind}}\) for proving that \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\) is a binding key. We assume that group generator \(\mathcal{G}\) is transparent, i.e., \((\mathbb {G}, q, g) \in \mathcal{G}(\ensuremath {1^\ensuremath {\lambda }})\) can be verified publicly, and focus on the relation among (ghuv). Concretely, the proof is for the following relation:

$$\begin{aligned} R^{\textsf{bind}} := \left\{ (\rho _1, \rho _2) \,|\, u = g^{\rho _1}\, \wedge \,v = h^{\rho _2} \, \wedge \, \rho _1 \ne \rho _2 \right\} . \end{aligned}$$

Inequality \(\rho _1 \ne \rho _2\) is shown by checking \(d_1^{(\rho _1 - \rho _2)} \ne 1_{\mathbb {G}}\) for a random generator \(d_1\).

[ \(\varPi ^{\textsf{bind}}\) : Proof of Binding Key]

  • Prover’s private input is \((\rho _1, \rho _2)\), and the common input to the prover and verifier is \(\ensuremath {\textsf{ck}}:=(\mathbb {G}, q, g, h, u, v)\).

  • Prover computes , \(d_2 := d_1^{(\rho _1 - \rho _2)}\), , \(a_1 := g^{r_1}\), \(a_2 := h^{r_2}\), \(a_3 := d_1^{r_1 - r_2}\), and sends \((a_1, a_2, a_3, d_1, d_2)\) to the verifier.

  • Verifier selects and send it to Prover.

  • Prover computes \(z_1 = r_1 - c\, \rho _1\), \(z_2 = r_2 - c\, \rho _2\), and send \((z_1, z_2)\) to Verifier

  • Verifier accepts if \(a_1 = g^{z_1} u^{c}\), \(a_2 = h^{z_2} v^{c}\), \(a_3 = d_1^{z_1 - z_2} d_2^{c}\), \(d_1 \ne 1_{\mathbb {G}}\), and \(d_2 \ne 1_{\mathbb {G}}\). Reject, otherwise.

Theorem 11

\(\varPi ^{\textsf{bind}}\) is a three-round public-coin proof protocol for relation \(R^{\textsf{bind}}\). It is complete, 2-special sound, and honest verifier zero-knowledge.

Proof

We focus on soundness and zero-knowledge properties since others are direct from the construction. To prove 2-special soundness, we construct an extractor, \(\mathcal E\), as follows. Given a colliding transcript \((\ensuremath {\textsf{ck}}, a_1, a_2, a_3, d_1, d_2, c, z_1, z_2, c', z'_1, z'_2)\) that satisfies

$$\begin{aligned} a_1 &= g^{z_1} u^c = g^{z'_1} u^{c'},\end{aligned}$$
(2)
$$\begin{aligned} a_2 &= h^{z_2} v^c = h^{z'_2} v^{c'},\end{aligned}$$
(3)
$$\begin{aligned} a_3 &= d_1^{z_1 - z_2} d_2^c = d_1^{z'_1 - z'_2} d_2^{c'}, \end{aligned}$$
(4)

\(c \ne c'\), \(d_1 \ne 1\), and \(d_2 \ne 1\), extractor \(\mathcal E\) computes

$$\begin{aligned} \rho _1 := \frac{z'_1 - z_1}{c - c'},\quad \rho _2 := \frac{z'_2 - z_2}{c - c'}, \end{aligned}$$

and outputs \((\rho _1,\rho _2)\).

To verify that \(\mathcal E\) is correct, observe that, from (2) and (3):

$$\begin{aligned} &z_1 + \log _g u \cdot c = z'_1 + \log _g u \cdot c' \Rightarrow \log _g u = \frac{z'_1 - z_1}{c - c'} = \rho _1, \text { and}\\ &z_2 + \log _h v \cdot c = z'_2 + \log _h v \cdot c' \Rightarrow \log _h v = \frac{z'_2 - z_2}{c - c'} = \rho _2. \end{aligned}$$

Also, from (4),

$$\begin{aligned} &(z_1 - z_2) + c \log _{d_1} d_2 =(z'_1 - z'_2) + c' \log _{d_1} d_2 \Rightarrow \log _{d_1} d_2 = \frac{z'_1 - z_1}{c - c'}- \frac{z'_2 - z_2}{c - c'}\\ &\Rightarrow \log _{d_1} d_2 = \log _g u - \log _h v = \rho _1 - \rho _2. \end{aligned}$$

Since \(d_1 \ne 1\) and \(d_2 \ne 1\), \(\log _{d_1} d_2 \ne 0\). Thus, we have \(\rho _1 - \rho _2 \ne 0\), proving \(\rho _1 \ne \rho _2\).

To prove honest verifier zero-knowledge, we construct a simulator, \(\ensuremath {{\mathcal {S}}}\), as follows. Given instance \(\ensuremath {\textsf{ck}}= (\mathbb {G}, g, h, u, v)\), \(\ensuremath {{\mathcal {S}}}\) picks \(c, z_1, z_2\) uniformly and independently of \(\ensuremath {\mathbb {Z}}_q\). It also chooses \(d_1\) and \(d_2\) uniformly and independently of \(\mathbb {G}\). It then computes \(\tilde{a}_1 := g^{\tilde{z}_1} u^{c}\), \(\tilde{a}_2 := h^{\tilde{z}_2} v^{c}\), and \(\tilde{a}_3 := d_1^{\tilde{z}_1 - \tilde{z}_2} d_2^{c}\). Finally, it outputs \((a_1, a_2, a_3, d_1, d_2, c, z_1, z_2)\).

We show that the above output from the simulator is computationally indistinguishable from that observed in a real protocol run. We construct a hybrid as follows. Given DDH question \(Q:=(g, A, B, C)\) relative to \(\mathcal{G}(1^n)\), we set \(u=A\), \(v = h^{\rho _2}\), \(d_1=B\) and \(d_2 = C B^{-\rho _2}\), and create other variables as prescribed by the simulator. This implies \(\rho _1 = \log _g A\). If Q is in the DDH distribution, \(C=B^{\rho _1}\). We then have \(d_2 = B^{\rho _1 - \rho _2}\). Thus, the transcript is in the same distribution as the real prover outputs. On the other hand, if Q is in a random distribution, \(d_2\) distributes uniformly as in the simulated transcript due to the randomness of C. Accordingly, the simulated and real transcripts are indistinguishable if the DDH assumption holds for \(\mathcal{G}(1^n)\). This concludes the proof of honest verifier computational zero-knowledge of \(\varPi ^{\textsf{bind}}\).

   \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2024 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abe, M., Bogdanov, A., Ohkubo, M., Rosen, A., Shang, Z., Tibouchi, M. (2024). CDS Composition of Multi-round Protocols. In: Reyzin, L., Stebila, D. (eds) Advances in Cryptology – CRYPTO 2024. CRYPTO 2024. Lecture Notes in Computer Science, vol 14928. Springer, Cham. https://doi.org/10.1007/978-3-031-68400-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-68400-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-68399-2

  • Online ISBN: 978-3-031-68400-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics