Fully Local Succinct Distributed Arguments

Authors Eden Aldema Tshuva , Rotem Oshman



PDF
Thumbnail PDF

File

LIPIcs.DISC.2024.1.pdf
  • Filesize: 0.92 MB
  • 24 pages

Document Identifiers

Author Details

Eden Aldema Tshuva
  • Tel Aviv University, Israel
Rotem Oshman
  • Tel Aviv University, Israel

Cite AsGet BibTex

Eden Aldema Tshuva and Rotem Oshman. Fully Local Succinct Distributed Arguments. In 38th International Symposium on Distributed Computing (DISC 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 319, pp. 1:1-1:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.DISC.2024.1

Abstract

Distributed certification is a proof system for detecting illegal network states or improper execution of distributed algorithms. A certification scheme consists of a proving algorithm, which assigns a certificate to each node, and a verification algorithm where nodes use these certificates to decide whether to accept or reject. The system must ensure that all nodes accept if and only if the network is in a legal state, adhering to the principles of completeness and soundness. The main goal is to design a scheme where the verification process is local and the certificates are succinct, while using as efficient as possible proving algorithm. In cryptographic proof systems, the soundness requirement is often relaxed to computational soundness, where soundness is guaranteed only against computationally bounded adversaries. Computationally sound proof systems are called arguments. Recently, Aldema Tshuva, Boyle, Cohen, Moran, and Oshman (TCC 2023) showed that succinct distributed arguments can be used to enable any polynomially bounded distributed algorithm to certify its execution with polylogarithmic-length certificates. However, their approach required a global communication phase, adding O(D) communication rounds in networks of diameter D, which limits its applicability to local algorithms. In this work, we give the first construction of a fully local succinct distributed argument system, where the prover and the verifier are both local. We show that a distributed algorithm that runs in R rounds, has polynomial local computation, and messages of B bits each can be compiled into a self-certifying algorithm that runs in R + polylog(n) rounds and sends messages of size B + polylog(n), with certificates of length polylog(n). This construction has several applications, including self-certification for local algorithms, ongoing certification of long-lived algorithms, and efficient local mending of the certificates when the network changes.

Subject Classification

ACM Subject Classification
  • Theory of computation → Cryptographic protocols
Keywords
  • distributed certification
  • proof labeling schemes
  • SNARG

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Miklós Ajtai. Generating hard instances of lattice problems. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages 99-108, 1996. Google Scholar
  2. Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, and Rotem Oshman. Locally verifiable distributed snargs. In Theory of Cryptography Conference, pages 65-90. Springer, 2023. Google Scholar
  3. Scott Ames, Carmit Hazay, Yuval Ishai, and Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight sublinear arguments without a trusted setup. In Proceedings of the 2017 acm sigsac conference on computer and communications security, pages 2087-2104, 2017. URL: https://doi.org/10.1145/3133956.3134104.
  4. B. Awerbuch, B. Patt-Shamir, and G. Varghese. Self-stabilization by local checking and correction. In Proceedings 32nd Annual Symposium of Foundations of Computer Science, pages 268-277, 1991. Google Scholar
  5. B. Awerbuch and M. Sipser. Dynamic networks are as fast as static networks. In [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science, pages 206-219, 1988. Google Scholar
  6. Alkida Balliu, Juho Hirvonen, Darya Melnyk, Dennis Olivetti, Joel Rybicki, and Jukka Suomela. Local mending. In Merav Parter, editor, Structural Information and Communication Complexity, pages 1-20, 2022. URL: https://doi.org/10.1007/978-3-031-09993-9_1.
  7. Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Fast reed-solomon interactive oracle proofs of proximity. In 45th international colloquium on automata, languages, and programming (icalp 2018). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018. Google Scholar
  8. Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, 2018. Google Scholar
  9. Aviv Bick, Gillat Kol, and Rotem Oshman. Distributed zero-knowledge proofs over networks. In SODA, pages 2426-2458. SIAM, 2022. URL: https://doi.org/10.1137/1.9781611977073.97.
  10. Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, and Sune K Jakobsen. Linear-time zero-knowledge proofs for arithmetic circuit satisfiability. In International Conference on the Theory and Application of Cryptology and Information Security, pages 336-365. Springer, 2017. URL: https://doi.org/10.1007/978-3-319-70700-6_12.
  11. Jonathan Bootle, Alessandro Chiesa, and Jens Groth. Linear-time arguments with sublinear verification from tensor codes. In Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II 18, pages 19-46. Springer, 2020. URL: https://doi.org/10.1007/978-3-030-64378-2_2.
  12. Keren Censor-Hillel, Ami Paz, and Mor Perry. Approximate proof-labeling schemes. Theoretical Computer Science, 811:112-124, 2020. URL: https://doi.org/10.1016/J.TCS.2018.08.020.
  13. Yi-Jun Chang and Mohsen Ghaffari. Strong-diameter network decomposition. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, pages 273-281, 2021. URL: https://doi.org/10.1145/3465084.3467933.
  14. Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, and Jiaheng Zhang. Correlation intractability and SNARGs from sub-exponential DDH. In Proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023, Part IV, volume 14084 of LNCS, pages 635-668. Springer, 2023. URL: https://doi.org/10.1007/978-3-031-38551-3_20.
  15. Arka Rai Choudhuri, Abhishek Jain, and Zhengzhong Jin. Non-interactive batch arguments for NP from standard assumptions. In Proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021, Part IV, volume 12828 of LNCS, pages 394-423. Springer, 2021. URL: https://doi.org/10.1007/978-3-030-84259-8_14.
  16. Arka Rai Choudhuri, Abhishek Jain, and Zhengzhong Jin. SNARGs for P from LWE. In 62nd IEEE Annual Symposium on Foundations of Computer Science (FOCS), pages 68-79, 2021. Google Scholar
  17. Pierluigi Crescenzi, Pierre Fraigniaud, and Ami Paz. Trade-offs in distributed interactive proofs. In DISC, volume 146 of LIPIcs, pages 13:1-13:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019. URL: https://doi.org/10.4230/LIPICS.DISC.2019.13.
  18. Ivan Bjerre Damgård. Collision free hash functions and public key signature schemes. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 203-216. Springer, 1987. Google Scholar
  19. Shlomi Dolev. Self-Stabilization. MIT Press, 2000. Google Scholar
  20. Yuval Emek, Yuval Gil, and Shay Kutten. Locally Restricted Proof Labeling Schemes. In 36th International Symposium on Distributed Computing (DISC 2022), volume 246, pages 20:1-20:22, 2022. URL: https://doi.org/10.4230/LIPICS.DISC.2022.20.
  21. Laurent Feuilloley, Pierre Fraigniaud, Juho Hirvonen, Ami Paz, and Mor Perry. Redundancy in distributed proofs. Distributed Comput., 34(2):113-132, 2021. URL: https://doi.org/10.1007/S00446-020-00386-Z.
  22. Pierre Fraigniaud, Pedro Montealegre, Rotem Oshman, Ivan Rapaport, and Ioan Todinca. On distributed Merlin-Arthur decision protocols. In SIROCCO, volume 11639 of LNCS, pages 230-245. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-24922-9_16.
  23. Pierre Fraigniaud, Boaz Patt-Shamir, and Mor Perry. Randomized proof-labeling schemes. Distributed Computing, 32:217-234, 2019. URL: https://doi.org/10.1007/S00446-018-0340-8.
  24. Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, and Riad S Wahby. Brakedown: Linear-time and field-agnostic snarks for r1cs. In Annual International Cryptology Conference, pages 193-226. Springer, 2023. URL: https://doi.org/10.1007/978-3-031-38545-2_7.
  25. Mika Göös and Jukka Suomela. Locally checkable proofs in distributed computing. Theory Comput., 12(1):1-33, 2016. URL: https://doi.org/10.4086/TOC.2016.V012A019.
  26. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Cryptography with constant computational overhead. In Proceedings of the fortieth annual ACM symposium on Theory of computing, pages 433-442, 2008. URL: https://doi.org/10.1145/1374376.1374438.
  27. Yael Kalai, Alex Lombardi, Vinod Vaikuntanathan, and Daniel Wichs. Boosting batch arguments and RAM delegation. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC), pages 1545-1552, 2023. URL: https://doi.org/10.1145/3564246.3585200.
  28. Yael Tauman Kalai, Alex Lombardi, and Vinod Vaikuntanathan. Snargs and ppad hardness from the decisional diffie-hellman assumption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 470-498. Springer, 2023. URL: https://doi.org/10.1007/978-3-031-30617-4_16.
  29. Yael Tauman Kalai, Omer Paneth, and Lisa Yang. How to delegate computations publicly. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019, pages 1115-1124. ACM, 2019. URL: https://doi.org/10.1145/3313276.3316411.
  30. Gillat Kol, Rotem Oshman, and Raghuvansh R. Saxena. Interactive distributed proofs. In Symposium on Principles of Distributed Computing (PODC), pages 255-264, 2018. URL: https://dl.acm.org/citation.cfm?id=3212771.
  31. Michael König and Roger Wattenhofer. On local fixing. In Principles of Distributed Systems, pages 191-205. Springer International Publishing, 2013. URL: https://doi.org/10.1007/978-3-319-03850-6_14.
  32. Amos Korman and Shay Kutten. Distributed verification of minimum spanning trees. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pages 26-34, 2006. URL: https://doi.org/10.1145/1146381.1146389.
  33. Amos Korman and Shay Kutten. Distributed verification of minimum spanning trees. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pages 26-34, 2006. URL: https://doi.org/10.1145/1146381.1146389.
  34. Amos Korman, Shay Kutten, and David Peleg. Proof labeling schemes. In Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, pages 9-18, 2005. URL: https://doi.org/10.1145/1073814.1073817.
  35. Jonathan Lee, Srinath Setty, Justin Thaler, and Riad Wahby. Linear-time and post-quantum zero-knowledge snarks for r1cs. Cryptology ePrint Archive, 2021. Google Scholar
  36. Christoph Lenzen, Jukka Suomela, and Roger Wattenhofer. Local algorithms: Self-stabilization on speed. In Stabilization, Safety, and Security of Distributed Systems, pages 17-34, 2009. URL: https://doi.org/10.1007/978-3-642-05118-0_2.
  37. Nathan Linial and Michael Saks. Low diameter graph decompositions. Combinatorica, 13(4):441-454, 1993. URL: https://doi.org/10.1007/BF01303516.
  38. Ralph C. Merkle. A certified digital signature. In Proceedings of the 9th Annual International Cryptology Conference, CRYPTO '89, volume 435 of LNCS, pages 218-238. Springer, 1989. URL: https://doi.org/10.1007/0-387-34805-0_21.
  39. Silvio Micali. Computationally sound proofs. SIAM Journal on Computing, 30(4):1253-1298, 2000. URL: https://doi.org/10.1137/S0097539795284959.
  40. Pedro Montealegre, Diego Ramírez-Romero, and Ivan Rapaport. Shared vs private randomness in distributed interactive proofs. arXiv preprint arXiv:2006.16191, 2020. URL: https://arxiv.org/abs/2006.16191.
  41. Moni Naor, Merav Parter, and Eylon Yogev. The power of distributed verifiers in interactive proofs. In Shuchi Chawla, editor, Symposium on Discrete Algorithms (SODA), pages 1096-115, 2020. URL: https://doi.org/10.1137/1.9781611975994.67.
  42. Rafail Ostrovsky, Mor Perry, and Will Rosenbaum. Space-time tradeoffs for distributed verification. In International Colloquium on Structural Information and Communication Complexity, pages 53-70. Springer, 2017. URL: https://doi.org/10.1007/978-3-319-72050-0_4.
  43. Omer Paneth and Rafael Pass. Incrementally verifiable computation via rate-1 batch arguments. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 1045-1056. IEEE, 2022. URL: https://doi.org/10.1109/FOCS54457.2022.00102.
  44. Noga Ron-Zewi and Ron D Rothblum. Proving as fast as computing: succinct arguments with constant prover overhead. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pages 1353-1363, 2022. URL: https://doi.org/10.1145/3519935.3519956.
  45. Václav Rozhoň and Mohsen Ghaffari. Polylogarithmic-time deterministic network decomposition and distributed derandomization. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pages 350-363, 2020. Google Scholar
  46. Paul Valiant. Incrementally verifiable computation or proofs of knowledge imply time/space efficiency. In Theory of Cryptography Conference, pages 1-18. Springer, 2008. URL: https://doi.org/10.1007/978-3-540-78524-8_1.
  47. Michael Walfish and Andrew J Blumberg. Verifying computations without reexecuting them. Communications of the ACM, 58(2):74-84, 2015. URL: https://doi.org/10.1145/2641562.
  48. Brent Waters and David J. Wu. Batch arguments for NP and more from standard bilinear group assumptions. In Proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, Part II, volume 13508 of LNCS, pages 433-463. Springer, 2022. URL: https://doi.org/10.1007/978-3-031-15979-4_15.
  49. Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. Libra: Succinct zero-knowledge proofs with optimal prover computation. In Advances in Cryptology-CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part III 39, pages 733-764. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-26954-8_24.
  50. Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, and Yupeng Zhang. Doubly efficient interactive proofs for general arithmetic circuits with linear prover time. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 159-177, 2021. URL: https://doi.org/10.1145/3460120.3484767.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail