ZK-PCPs from leakage-resilient secret sharing

Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC '97) are PCPs with the additional zero-knowledge guarantee that the view of any (possibly malicious) verifier making a bounded number of queries to the proof can be efficiently simulated up to a small statistical distance. Similarly, ZK-PCPs of Proximity (ZK-PCPPs; Ishai and Weiss, TCC '14) are PCPPs in which the view of an adversarial verifier can be efficiently simulated with few queries to the input. Previous ZK-PCP constructions obtained an exponential gap between the query complexity q of the honest verifier, and the bound q on the queries of a malicious verifier (i.e., q = poly log (q)), but required either exponential-time simulation, or adaptive honest verification. This should be contrasted with standard PCPs, that can be verified non-adaptively (i.e., with a single round of queries to the proof). The problem of constructing such ZK-PCPs, even when q = q, has remained open since they were first introduced more than 2 decades ago. This question is also open for ZK-PCPPs, for which no construction with non-adaptive honest verification is known (not even with exponential-time simulation). We resolve this question by constructing the first ZK-PCPs and ZK-PCPPs which simultaneously achieve efficient zero-knowledge simulation and non-adaptive honest verification. Our schemes have a square-root query gap, namely q/q = O(√n) where n is the input length. Our constructions combine the “MPC-in-the-head” technique (Ishai et al., STOC '07) with leakage-resilient secret sharing. Specifically, we use the MPC-in-the-head technique to construct a ZK-PCP variant over a large alphabet, then employ leakage-resilient secret sharing to design a new alphabet reduction for ZK-PCPs which preserves zero-knowledge.

Original languageEnglish
Title of host publication2nd Conference on Information-Theoretic Cryptography, ITC 2021
EditorsStefano Tessaro
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959771979
DOIs
StatePublished - 1 Jul 2021
Event2nd Conference on Information-Theoretic Cryptography, ITC 2021 - Virtual, Bertinoro, Italy
Duration: 23 Jul 202126 Jul 2021

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume199

Conference

Conference2nd Conference on Information-Theoretic Cryptography, ITC 2021
Country/TerritoryItaly
CityVirtual, Bertinoro
Period23/07/2126/07/21

Keywords

  • Leakage resilience
  • PCPs of proximity
  • Probabilisitically checkable proofs
  • Secret sharing
  • Zero knowledge

All Science Journal Classification (ASJC) codes

  • Software

Cite this