ZK-PCPs from Leakage-Resilient Secret Sharing

Authors Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss

Thumbnail PDF


  • Filesize: 0.81 MB
  • 21 pages

Document Identifiers

Author Details

Carmit Hazay
  • Bar-Ilan University, Ramat Gan, Israel
Muthuramakrishnan Venkitasubramaniam
  • University of Rochester, NY, USA
Mor Weiss
  • Bar-Ilan University, Ramat Gan, Israel


We thank the anonymous ITC`21 reviewers for their helpful comments, in particular for pointing out the connection to RPEs and noting that the ZK code of [Scott E. Decatur et al., 1999] is equivocal.

Cite AsGet BibTex

Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss. ZK-PCPs from Leakage-Resilient Secret Sharing. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Leibniz International Proceedings in Informatics (LIPIcs), Volume 199, pp. 6:1-6:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)


Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC `97) are PCPs with the additional zero-knowledge guarantee that the view of any (possibly malicious) verifier making a bounded number of queries to the proof can be efficiently simulated up to a small statistical distance. Similarly, ZK-PCPs of Proximity (ZK-PCPPs; Ishai and Weiss, TCC `14) are PCPPs in which the view of an adversarial verifier can be efficiently simulated with few queries to the input. Previous ZK-PCP constructions obtained an exponential gap between the query complexity q of the honest verifier, and the bound q^* on the queries of a malicious verifier (i.e., q = poly log (q^*)), but required either exponential-time simulation, or adaptive honest verification. This should be contrasted with standard PCPs, that can be verified non-adaptively (i.e., with a single round of queries to the proof). The problem of constructing such ZK-PCPs, even when q^* = q, has remained open since they were first introduced more than 2 decades ago. This question is also open for ZK-PCPPs, for which no construction with non-adaptive honest verification is known (not even with exponential-time simulation). We resolve this question by constructing the first ZK-PCPs and ZK-PCPPs which simultaneously achieve efficient zero-knowledge simulation and non-adaptive honest verification. Our schemes have a square-root query gap, namely q^*/q = O(√n) where n is the input length. Our constructions combine the "MPC-in-the-head" technique (Ishai et al., STOC `07) with leakage-resilient secret sharing. Specifically, we use the MPC-in-the-head technique to construct a ZK-PCP variant over a large alphabet, then employ leakage-resilient secret sharing to design a new alphabet reduction for ZK-PCPs which preserves zero-knowledge.

Subject Classification

ACM Subject Classification
  • Security and privacy → Information-theoretic techniques
  • Theory of computation → Cryptographic protocols
  • Security and privacy → Cryptography
  • Theory of computation → Proof complexity
  • Zero Knowledge
  • Probabilisitically Checkable Proofs
  • PCPs of Proximity
  • Leakage Resilience
  • Secret Sharing


  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    PDF Downloads


  1. Divesh Aggarwal, Ivan Damgård, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, João L. Ribeiro, and Mark Simkin. Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In CRYPTO, Proceedings, Part II, pages 510-539, 2019. Google Scholar
  2. Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof verification and hardness of approximation problems. In FOCS, Proceedings, pages 14-23, 1992. Google Scholar
  3. Sanjeev Arora and Shmuel Safra. Probabilistic checking of proofs; A new characterization of NP. In FOCS, Proceedings, pages 2-13, 1992. Google Scholar
  4. Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, and Li-Yang Tan. Non-malleable codes for small-depth circuits. In FOCS, pages 826-837, 2018. Google Scholar
  5. Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, and Tal Malkin. Non-malleable codes for bounded depth, bounded fan-in circuits. In EUROCRYPT, pages 881-908, 2016. Google Scholar
  6. Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil P. Vadhan. Robust PCPs of proximity, shorter PCPs and applications to coding. In STOC, Proceedings, pages 1-10, 2004. Google Scholar
  7. Eli Ben-Sasson and Madhu Sudan. Short PCPs with polylog query complexity. SIAM J. Comput., 38(2):551-607, 2008. Google Scholar
  8. Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, and Tal Rabin. On the local leakage resilience of linear secret sharing schemes. In CRYPTO, Proceedings, pages 531-561, 2018. Google Scholar
  9. Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, and Tal Malkin. On adaptive vs. non-adaptive security of multiparty protocols. In EUROCRYPT, Proceedings, pages 262-279, 2001. Google Scholar
  10. Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, and Hoeteck Wee. Black-box construction of a non-malleable encryption scheme from any semantically secure one. In TCC, pages 427-444, 2008. Google Scholar
  11. Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, and Hoeteck Wee. A black-box construction of non-malleable encryption from semantically secure encryption. J. Cryptol., 31(1):172-201, 2018. Google Scholar
  12. Francesco Davì, Stefan Dziembowski, and Daniele Venturi. Leakage-resilient storage. In SCN, Proceedings, pages 121-137, 2010. Google Scholar
  13. Scott E. Decatur, Oded Goldreich, and Dana Ron. A probabilistic error-correcting scheme. IACR Cryptol. ePrint Arch., 1997:5, 1997. Google Scholar
  14. Scott E. Decatur, Oded Goldreich, and Dana Ron. Computational sample complexity. SIAM J. Comput., 29(3):854-879, 1999. Google Scholar
  15. Irit Dinur. The PCP theorem by gap amplification. In STOC, Proceedings, pages 241-250, 2006. Google Scholar
  16. Irit Dinur and Omer Reingold. Assignment testers: Towards a combinatorial proof of the PCP-theorem. In FOCS, Proceedings, pages 155-164, 2004. Google Scholar
  17. Stefan Dziembowski and Krzysztof Pietrzak. Intrusion-resilient secret sharing. In FOCS, Proceedings, pages 227-237, 2007. Google Scholar
  18. Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof-systems (extended abstract). In STOC, Proceedings, pages 291-304, 1985. Google Scholar
  19. Vipul Goyal and Ashutosh Kumar. Non-malleable secret sharing. In STOC, Proceedings, pages 685-698, 2018. Google Scholar
  20. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, and Mor Weiss. ZK-PCPs from leakage-resilient secret sharing. IACR Cryptol. ePrint Arch., 2021:606, 2021. URL: https://eprint.iacr.org/2021/606.
  21. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Zero-knowledge from secure multiparty computation. In STOC, Proceedings, pages 21-30, 2007. Google Scholar
  22. Yuval Ishai, Mohammad Mahmoody, and Amit Sahai. On efficient zero-knowledge PCPs. In TCC, Proceedings, pages 151-168, 2012. Google Scholar
  23. Yuval Ishai, Amit Sahai, Michael Viderman, and Mor Weiss. Zero knowledge LTCs and their applications. In RANDOM, Proceedings, pages 607-622, 2013. Google Scholar
  24. Yuval Ishai and Mor Weiss. Probabilistically checkable proofs of proximity with zero-knowledge. In TCC, Proceedings, pages 121-145, 2014. Google Scholar
  25. Yuval Ishai, Mor Weiss, and Guang Yang. Making the best of a leaky situation: Zero-knowledge PCPs from leakage-resilient circuits. In TCC, Proceedings, pages 3-32, 2016. Google Scholar
  26. Joe Kilian, Erez Petrank, and Gábor Tardos. Probabilistically checkable proofs with zero knowledge. In STOC, Proceedings, pages 496-505, 1997. Google Scholar
  27. Thilo Mie. Short PCPPs verifiable in polylogarithmic time with O(1) queries. Ann. Math. Artif. Intell., 56(3-4):313-338, 2009. Google Scholar
  28. Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979. Google Scholar
  29. Akshayaram Srinivasan and Prashant Nalini Vasudevan. Leakage resilient secret sharing and applications. In CRYPTO, Proceedings, pages 480-509, 2019. Google Scholar
  30. Mor Weiss. Secure computation and probabilistic checking. PhD Thesis, 2016. Google Scholar