[Resource Topic] 2015/910: QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions

Welcome to the resource topic for 2015/910

Title:
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions

Authors: Alonso González, Alejandro Hevia, Carla Ràfols

Abstract:

A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces of \mathbb{G}^m, where \mathbb{G} is a group equipped with a bilinear map e : G \times H \to T. Although applicable to any bilinear group, these techniques are less useful in the asymmetric case. For example, Jutla and Roy (Crypto 2014) show how to do QA aggregation of Groth- Sahai proofs, but the types of equations which can be aggregated are more restricted in the asymmetric setting. Furthermore, there are natural statements which cannot be expressed as membership in linear subspaces, for example the satisfiability of quadratic equations. In this paper we develop specific techniques for asymmetric groups. We introduce a new computational assumption, under which we can recover all the aggregation results of Groth-Sahai proofs known in the symmetric setting. We adapt the arguments of membership in linear spaces of \mathbb{G}^m to linear subspaces of \mathbb{G}^m \times \mathbb{H}^n. In particular, we give a constant-size argument that two sets of Groth-Sahai commitments, defined over different groups \mathbb{G},\mathbb{H}, open to the same scalars in \mathbb{Z}_q, a useful tool to prove satisfiability of quadratic equations in \mathbb{Z}_q. We then use one of the arguments for subspaces in \mathbb{G}^m \times\mathbb{H}^n and develop new techniques to give constant-size QA-NIZK proofs that a commitment opens to a bit-string. To the best of our knowledge, these are the first constant-size proofs for quadratic equations in \mathbb{Z}_q under standard and falsifiable assumptions. As a result, we obtain improved threshold Groth-Sahai proofs for pairing product equations, ring signatures, proofs of membership in a list, and various types of signature schemes.

ePrint: https://eprint.iacr.org/2015/910

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .