Security Bounds for Proof-Carrying Data from Straightline Extractors

Alessandro Chiesa, Ziyi Guan, Shahar Samocha, Eylon Yogev

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Proof-carrying data (PCD) is a powerful cryptographic primitive that allows mutually distrustful parties to perform distributed computation in an efficiently verifiable manner. Real-world deployments of PCD have sparked keen interest within the applied community and industry. Known constructions of PCD are obtained by recursively-composing SNARKs or related primitives. Unfortunately, known security analyses incur expensive blowups, which practitioners have disregarded as the analyses would lead to setting parameters that are prohibitively expensive. In this work we study the concrete security of recursive composition, with the goal of better understanding how to reasonably set parameters for certain PCD constructions of practical interest. Our main result is that PCD obtained from SNARKs with straightline knowledge soundness has essentially the same security as the underlying SNARK (i.e., recursive composition incurs essentially no security loss). We describe how straightline knowledge soundness is achieved by SNARKs in several oracle models, which results in a highly efficient security analysis of PCD that makes black-box use of the SNARK’s oracle (there is no need to instantiated the oracle to carry out the security reduction). As a notable application, our work offers an idealized model that provides new, albeit heuristic, insights for the concrete security of recursive STARKs used in blockchain systems. Our work could be viewed as partial evidence justifying the parameter choices for recursive STARKs made by practitioners.

Original languageEnglish
Title of host publicationTheory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
EditorsElette Boyle, Mohammad Mahmoody
PublisherSpringer Science and Business Media Deutschland GmbH
Pages464-496
Number of pages33
ISBN (Print)9783031780165
DOIs
StatePublished - 2025
Event22nd Theory of Cryptography Conference, TCC 2024 - Milan, Italy
Duration: 2 Dec 20246 Dec 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15365 LNCS

Conference

Conference22nd Theory of Cryptography Conference, TCC 2024
Country/TerritoryItaly
CityMilan
Period2/12/246/12/24

Keywords

  • concrete security
  • proof-carrying data
  • relativization
  • succinct non-interactive arguments

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Cite this