On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

被引:0
|
作者
Andreeva, Elena [1 ]
Bhattacharyya, Rishiraj [2 ]
Roy, Arnab [3 ]
Trevisani, Stefano [1 ]
机构
[1] TU Wien, Res Unit Secur & Privacy, Favoritenstr 9-11, A-1040 Vienna, Austria
[2] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
[3] Univ Innsbruck, Secur & Privacy Lab, Tech Str 21A, A-6020 Innsbruck, Austria
来源
2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024 | 2024年
基金
奥地利科学基金会;
关键词
Hash function; Block cipher; Arithmetization-Oriented; Merkle tree; Zero-Knowledge; SNARK;
D O I
10.1109/CSF61375.2024.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ZK-SNARKs, a fundamental component of privacy-oriented payment systems, identity protocols, or anonymous voting systems, are advanced cryptographic protocols for verifiable computation: modern SNARKs allow to encode the invariants of a program, expressed as an arithmetic circuit, in an appropriate constraint language from which short, zero-knowledge proofs for correct computations can be constructed. One of the most important computations that is run through SNARK systems is the verification of Merkle tree (MT) opening proofs, which relies on the evaluation of a fixed-input-length (FIL) cryptographic compression function over binary MTs. As classical, bit-oriented hash functions like SHA-2 are not compactly representable in SNARK frameworks, Arithmetization-Oriented (AO) cryptographic designs have emerged as an alternative, efficient solution. Today, the majority of AO compression functions are built from permutation-based hashing modes, such as Sponge. While this approach allows cost savings, compared to blockcipher-based modes, as it does not require key-scheduling, AO blockcipher schedulers are often cheap to compute. Furthermore, classical bit-oriented cryptography has long studied how to construct provably secure compression functions from blockciphers, following the Preneel-Govaerts-Vandewalle (PGV) framework. The potential efficiency gains together with the strong provable security foundations in the classic setting, motivate the study of AO blockcipher-based compression functions. In this work, we propose AO PGV-LC and PGV-ELC, two AO blockcipher-based FIL compression modes inspired by and extending the classical PGV approach, offering flexible input and output sizes and coming with provable security guarantees in the AO setting. We prove the collision and preimage resistance in the ideal cipher model, and give bounds for collision and opening resistance over MTs of arbitrary arity. We compare experimentally the AO PGV-ELC mode over the HADES blockcipher with its popular and widely adopted Sponge instantiation, POSEIDON, and its improved variant POSEIDON2. Our resulting constructions are up to 3x faster than POSEIDON and 2x faster than POSEIDON2 in native x86 execution, and up to 50% faster in the Groth16 SNARK framework. Finally, we study the benefits of using MTs of arity wider than two, proposing a new strategy to obtain a compact R1CS constraint system in such case. In fact, by combining an efficient parametrization of the HADES blockcipher over the PGV-ELC mode, together with an optimal choice of the MT arity, we measured an improvement of up to 9x in native MT construction time, and up to 2.5x in proof generation time, compared to POSEIDON over binary MTs.
引用
收藏
页码:295 / 310
页数:16
相关论文
共 50 条
  • [1] New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode
    Bouvier, Clemence
    Briaud, Pierre
    Chaidos, Pyrros
    Perrin, Leo
    Salen, Robin
    Velichkov, Vesselin
    Willems, Danny
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 507 - 539
  • [2] Arithmetization-oriented APN permutations
    Budaghyan, Lilya
    Pal, Mohit
    DESIGNS CODES AND CRYPTOGRAPHY, 2024,
  • [3] The Algebraic FreeLunch: Efficient Grobner Basis Attacks Against Arithmetization-Oriented Primitives
    Bariant, Augustin
    Boeuf, Aurelien
    Lemoine, Axel
    Ayala, Irati Manterola
    Oygarden, Morten
    Perrin, Leo
    Raddum, Havard
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 139 - 173
  • [4] Algebraic Attacks against Some Arithmetization-Oriented Primitives
    Bariant, Augustin
    Bouvier, Clemence
    Leurent, Gaetan
    Perrin, Leo
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (03) : 73 - 101
  • [5] Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers
    Zhengnan Li
    Baofeng Wu
    Dongdai Lin
    Journal of Systems Science and Complexity, 2023, 36 : 2681 - 2702
  • [6] Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers
    Li Zhengnan
    Wu Baofeng
    Lin Dongdai
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2023, 36 (06) : 2681 - 2702
  • [7] Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers
    LI Zhengnan
    WU Baofeng
    LIN Dongdai
    JournalofSystemsScience&Complexity, 2023, 36 (06) : 2681 - 2702
  • [8] Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol
    Ni, Jianqiang
    Zhang, Jianhui
    Wang, Gaoli
    Li, Rui
    Shen, Yanzhao
    SYMMETRY-BASEL, 2023, 15 (08):
  • [9] Arithmetization-oriented APN permutationsArithmetization-oriented APN permutationsL. Budaghyan, M. Pal
    Lilya Budaghyan
    Mohit Pal
    Designs, Codes and Cryptography, 2025, 93 (4) : 1067 - 1088
  • [10] Efficient Braille Transformation for Secure Password Hashing
    Touil, Hamza
    Akkad, Nabil El
    Satori, Khalid
    Soliman, Naglaa F.
    El-Shafai, Walid
    IEEE ACCESS, 2024, 12 : 5212 - 5221