Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Security Bounds for Proof-Carrying Data from Straightline Extractors
 
conference paper

Security Bounds for Proof-Carrying Data from Straightline Extractors

Chiesa, Alessandro  
•
Guan, Ziyi  
•
Samocha, Shahar
Show more
Boyle, Elette
•
Boyle, Elette
Show more
2025
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
22nd Theory of Cryptography Conference

Proof-carrying data (PCD) is a powerful cryptographic primitive that allows mutually distrustful parties to perform distributed computation in an efficiently verifiable manner. Real-world deployments of PCD have sparked keen interest within the applied community and industry. Known constructions of PCD are obtained by recursively-composing SNARKs or related primitives. Unfortunately, known security analyses incur expensive blowups, which practitioners have disregarded as the analyses would lead to setting parameters that are prohibitively expensive. In this work we study the concrete security of recursive composition, with the goal of better understanding how to reasonably set parameters for certain PCD constructions of practical interest. Our main result is that PCD obtained from SNARKs with straightline knowledge soundness has essentially the same security as the underlying SNARK (i.e., recursive composition incurs essentially no security loss). We describe how straightline knowledge soundness is achieved by SNARKs in several oracle models, which results in a highly efficient security analysis of PCD that makes black-box use of the SNARK’s oracle (there is no need to instantiated the oracle to carry out the security reduction). As a notable application, our work offers an idealized model that provides new, albeit heuristic, insights for the concrete security of recursive STARKs used in blockchain systems. Our work could be viewed as partial evidence justifying the parameter choices for recursive STARKs made by practitioners.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-031-78017-2_16
Scopus ID

2-s2.0-85211441965

Author(s)
Chiesa, Alessandro  

École Polytechnique Fédérale de Lausanne

Guan, Ziyi  

École Polytechnique Fédérale de Lausanne

Samocha, Shahar

StarkWare

Yogev, Eylon

Bar-Ilan University

Editors
Boyle, Elette
•
Boyle, Elette
•
Mahmoody, Mohammad
Date Issued

2025

Publisher

Springer Science and Business Media Deutschland GmbH

Published in
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
Series title/Series vol.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 15365 LNCS

ISSN (of the series)

1611-3349

0302-9743

Start page

464

End page

496

Subjects

concrete security

•

proof-carrying data

•

relativization

•

succinct non-interactive arguments

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
COMPSEC  
Event nameEvent acronymEvent placeEvent date
22nd Theory of Cryptography Conference

Milan, Italy

2024-12-02 - 2024-12-06

FunderFunding(s)Grant NumberGrant URL

Alon Young Faculty Fellowship

Ethereum Foundation

European Research Union

Show more
Available on Infoscience
January 26, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/244802
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés