Zero-knowledge proof: Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>Northern Moonlight
 
imported>Nailujon
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{Short description|Proving validity without revealing other data}}
{{Short description|Proving validity without revealing other data}}


In [[cryptography]], a '''zero-knowledge proof''' (also known as a '''ZK proof''' or '''ZKP''') is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ''beyond'' the mere fact of that statement's truth.<ref>{{Citation |last=Aad |first=Imad |title=Zero-Knowledge Proof |date=2023 |work=Trends in Data Protection and Encryption Technologies |pages=25–30 |editor-last=Mulder |editor-first=Valentin |place=Cham |publisher=Springer Nature Switzerland |language=en |doi=10.1007/978-3-031-33386-6_6 |isbn=978-3-031-33386-6 |editor2-last=Mermoud |editor2-first=Alain |editor3-last=Lenders |editor3-first=Vincent |editor4-last=Tellenbach |editor4-first=Bernhard|doi-access=free }}</ref> The intuition underlying zero-knowledge proofs is that it is trivial to prove possession of the relevant information simply by revealing it; the hard part is to prove this possession without revealing this information (or any aspect of it whatsoever).<ref>{{cite book |last=Goldreich |first=Oded |author-link= |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=184 |doi=10.1017/CBO9780511546891 |isbn= 9780511546891}}</ref>
In [[cryptography]], a '''zero-knowledge proof''' (also known as a '''ZK proof''' or '''ZKP''') is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ''beyond'' the mere fact of that statement's truth.<ref name="knowledgecomplexity" /> The intuition behind the nontriviality of zero-knowledge proofs is that it is trivial to prove possession of the relevant information simply by revealing it; the hard part is to prove this possession without revealing this information (or any aspect of it whatsoever).<ref>{{cite book |last=Goldreich |first=Oded |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=184 |doi=10.1017/CBO9780511546891 |isbn= 978-0-511-54689-1}}</ref>


In light of the fact that one should be able to generate a proof of some statement ''only'' when in possession of certain secret information connected to the statement, the verifier, even after having become convinced of the statement's truth, should nonetheless remain unable to prove the statement to further third parties.
In light of the fact that one should be able to generate a proof of some statement ''only'' when in possession of certain secret information connected to the statement, the verifier, even after having become convinced of the statement's truth by means of a zero-knowledge proof, should nonetheless remain unable to prove the statement to further third parties.


Zero-knowledge proofs can be interactive, meaning that the prover and verifier exchange messages according to some protocol, or noninteractive, meaning that the verifier is convinced by a single prover message and no other communication is needed. In the [[Standard model (cryptography)|standard model]], interaction is required, except for trivial proofs of [[BPP (complexity)|BPP]] problems.<ref>{{cite book |last=Goldreich |first=Oded |author-link= |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=247 |doi=10.1017/CBO9780511546891 |isbn= 9780511546891}}</ref> In the [[Common random string model|common random string]] and [[random oracle]] models, [[non-interactive zero-knowledge proof]]s exist. The [[Fiat–Shamir heuristic]] can be used to transform certain interactive zero-knowledge proofs into noninteractive ones.<ref>{{cite book |last=Goldreich |first=Oded |author-link= |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=299 |doi=10.1017/CBO9780511546891 |isbn= 9780511546891}}</ref><ref name="noninteractive">{{cite book |first1=Manuel |last1=Blum |first2=Paul |last2=Feldman |first3=Silvio |last3=Micali |title=Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC '88 |chapter=Non-interactive zero-knowledge and its applications |date=1988 |pages=103–112 |doi=10.1145/62212.62222 |url=https://apps.dtic.mil/sti/pdfs/ADA222698.pdf |archive-url=https://wayback.archive-it.org/all/20181214020301/https://apps.dtic.mil/dtic/tr/fulltext/u2/a222698.pdf |url-status=live |archive-date=December 14, 2018 |isbn=978-0897912648 |s2cid=7282320 |access-date=June 2, 2022 }}</ref><ref name=noninteractive2>{{cite journal|last1=Wu|first1=Huixin|last2=Wang|first2=Feng|title=A Survey of Noninteractive Zero Knowledge Proof System and Its Applications|journal=The Scientific World Journal|date=2014|volume=2014|pages=560484|doi=10.1155/2014/560484|pmid=24883407|pmc=4032740|doi-access=free }}</ref>
Zero-knowledge proofs can be interactive, meaning that the prover and verifier exchange messages according to some protocol, or noninteractive, meaning that the verifier is convinced by a single prover message and no other communication is needed. In the [[Standard model (cryptography)|standard model]], interaction is required, except for trivial proofs of [[BPP (complexity)|BPP]] problems.<ref>{{cite book |last=Goldreich |first=Oded |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=247 |doi=10.1017/CBO9780511546891 |isbn= 978-0-511-54689-1}}</ref> In the [[Common random string model|common random string]] and [[random oracle]] models, [[non-interactive zero-knowledge proof]]s exist. The [[Fiat–Shamir heuristic]] can be used to transform certain interactive zero-knowledge proofs into noninteractive ones.<ref>{{cite book |last=Goldreich |first=Oded |title=Foundations of Cryptography Volume I |year=2001 |url=https://www.cambridge.org/core/books/foundations-of-cryptography/B61B6AD235D2034D511A5FF740415166 |location= |publisher=Cambridge University Press |page=299 |doi=10.1017/CBO9780511546891 |isbn= 978-0-511-54689-1}}</ref><ref name="noninteractive">{{cite book |first1=Manuel |last1=Blum |first2=Paul |last2=Feldman |first3=Silvio |last3=Micali |title=Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC '88 |chapter=Non-interactive zero-knowledge and its applications |date=1988 |pages=103–112 |doi=10.1145/62212.62222 |url=https://apps.dtic.mil/sti/pdfs/ADA222698.pdf |archive-url=https://wayback.archive-it.org/all/20181214020301/https://apps.dtic.mil/dtic/tr/fulltext/u2/a222698.pdf |url-status=live |archive-date=December 14, 2018 |isbn=978-0-89791-264-8 |s2cid=7282320 |access-date=June 2, 2022 }}</ref><ref name=noninteractive2>{{cite journal|last1=Wu|first1=Huixin|last2=Wang|first2=Feng|title=A Survey of Noninteractive Zero Knowledge Proof System and Its Applications|journal=The Scientific World Journal|date=2014|volume=2014|article-number=560484|doi=10.1155/2014/560484|pmid=24883407|pmc=4032740|doi-access=free }}</ref>


== Abstract examples ==
== Abstract examples ==
=== The red card proof ===
One example of a math-free zero knowledge proof is if Peggy wants to prove to Victor that she has drawn a red card from a standard deck of 52 playing cards, without revealing which specific red card she holds. Victor observes Peggy draw a card at random from the shuffled deck, but she keeps the card face-down so he cannot see it.
To prove her card is red without revealing its identity, Peggy takes the remaining 51 cards from the deck and systematically shows Victor all 26 black cards (the 13 spades and 13 clubs) one by one, placing them face-up on the table. Since a standard deck contains exactly 26 red cards and 26 black cards, and Peggy has demonstrated that all the black cards remain in the deck, Victor can conclude with certainty that Peggy's hidden card must be red.
This proof is zero-knowledge because Victor learns only that Peggy's card is red, but gains no information about whether it is a heart or diamond, or which specific red card she holds. The proof would be equally convincing whether Peggy held the Ace of Hearts or the Two of Diamonds. Furthermore, even if the interaction were recorded, the recording would not reveal Peggy's specific card to future observers, maintaining the zero-knowledge property.
If Peggy was lying and actually held a black card, she would be unable to produce all 26 black cards from the remaining deck, making deception impossible. This demonstrates the soundness of the proof system. This type of physical zero-knowledge proof using standard playing cards belongs to a broader class of card-based cryptographic protocols that allow participants to perform secure computations using everyday objects.<ref>{{cite web |url=https://fouryears.eu/2015/03/09/playing-card-cryptography/ |title=Playing Card Cryptography |work=Four Years Remaining |access-date=2025-06-04 }}</ref>
=== Where's Wally ===
Another well-known example of a zero-knowledge proof is the "Where's Wally" example. In this example, the prover wants to prove to the verifier that they know where Wally is on a page in a ''[[Where's Wally?]]'' book, without revealing his location to the verifier.<ref name=Murtagh>{{cite news
  | last        = Murtagh
  | first        = Jack 
  | date        =  July 1, 2023
  | title        = Where's Wally? How to Mathematically Prove You Found Him without Revealing Where He Is
  | url          = https://www.scientificamerican.com/article/wheres-waldo-how-to-prove-you-found-him-without-revealing-where-he-is/
  | work        = [[Scientific American]]
  | access-date  = 2023-10-02
}}</ref>
The prover starts by taking a large black board with a small hole in it, the size of Wally. The board is twice the size of the book in both directions, so the verifier cannot see where on the page the prover is placing it. The prover then places the board over the page so that Wally is in the hole.<ref name=Murtagh/>
The verifier can now look through the hole and see Wally, but cannot see any other part of the page. Therefore, the prover has proven to the verifier that they know where Wally is, without revealing any other information about his location.<ref name=Murtagh/>
This example is not a perfect zero-knowledge proof, because the prover does reveal some information about Wally's location, such as his body position. However, it is a decent illustration of the basic concept of a zero-knowledge proof.
=== The Ali Baba cave ===
=== The Ali Baba cave ===
{{multiple image
{{multiple image
Line 49: Line 77:


The above proof is ''zero-knowledge'' because Victor never learns which ball is green and which is red; indeed, he gains no knowledge about how to distinguish the balls.<ref>{{Cite news|url=https://www.linkedin.com/pulse/demonstrate-how-zero-knowledge-proofs-work-without-using-chalkias|title=Demonstrate how Zero-Knowledge Proofs work without using maths|last=Chalkias|first=Konstantinos|work=CordaCon 2017|access-date=2017-09-13|language=en}}</ref>
The above proof is ''zero-knowledge'' because Victor never learns which ball is green and which is red; indeed, he gains no knowledge about how to distinguish the balls.<ref>{{Cite news|url=https://www.linkedin.com/pulse/demonstrate-how-zero-knowledge-proofs-work-without-using-chalkias|title=Demonstrate how Zero-Knowledge Proofs work without using maths|last=Chalkias|first=Konstantinos|work=CordaCon 2017|access-date=2017-09-13|language=en}}</ref>
=== Where's Wally ===
One well-known example of a zero-knowledge proof is the "Where's Wally" example. In this example, the prover wants to prove to the verifier that they know where Wally is on a page in a ''[[Where's Wally?]]'' book, without revealing his location to the verifier.<ref name=Murtagh>{{cite news
  | last        = Murtagh
  | first        = Jack 
  | date        =  July 1, 2023
  | title        = Where's Wally? How to Mathematically Prove You Found Him without Revealing Where He Is
  | url          = https://www.scientificamerican.com/article/wheres-waldo-how-to-prove-you-found-him-without-revealing-where-he-is/
  | work        = [[Scientific American]]
  | access-date  = 2023-10-02
}}</ref>
The prover starts by taking a large black board with a small hole in it, the size of Wally. The board is twice the size of the book in both directions, so the verifier cannot see where on the page the prover is placing it. The prover then places the board over the page so that Wally is in the hole.<ref name=Murtagh/>
The verifier can now look through the hole and see Wally, but cannot see any other part of the page. Therefore, the prover has proven to the verifier that they know where Wally is, without revealing any other information about his location.<ref name=Murtagh/>
This example is not a perfect zero-knowledge proof, because the prover does reveal some information about Wally's location, such as his body position. However, it is a decent illustration of the basic concept of a zero-knowledge proof.


== Definition ==
== Definition ==
Line 86: Line 96:
where {{Math|View<sub>''<math>\hat V</math>''</sub>[''P''(''x'')&harr;''<math>\hat V</math>''(''x'',''z'')]}} is a record of the interactions between {{Math|''P''(''x'')}} and {{Math|''V''(''x'',''z'')}}. The prover {{Mvar|P}} is modeled as having unlimited computation power (in practice, {{Mvar|P}} usually is a [[probabilistic Turing machine]]). Intuitively, the definition states that an interactive proof system {{Math|(''P'',''V'')}} is zero-knowledge if for any verifier <math>\hat V</math> there exists an efficient simulator {{Mvar|S}} (depending on <math>\hat V</math>) that can reproduce the conversation between {{Mvar|P}} and <math>\hat V</math> on any given input. The auxiliary string {{Mvar|z}} in the definition plays the role of "prior knowledge" (including the random coins of <math>\hat V</math>). The definition implies that <math>\hat V</math> cannot use any prior knowledge string {{Mvar|z}} to mine information out of its conversation with {{Mvar|P}}, because if {{Mvar|S}} is also given this prior knowledge then it can reproduce the conversation between <math>\hat V</math> and {{Mvar|P}} just as before. {{citation needed|date=June 2021}}
where {{Math|View<sub>''<math>\hat V</math>''</sub>[''P''(''x'')&harr;''<math>\hat V</math>''(''x'',''z'')]}} is a record of the interactions between {{Math|''P''(''x'')}} and {{Math|''V''(''x'',''z'')}}. The prover {{Mvar|P}} is modeled as having unlimited computation power (in practice, {{Mvar|P}} usually is a [[probabilistic Turing machine]]). Intuitively, the definition states that an interactive proof system {{Math|(''P'',''V'')}} is zero-knowledge if for any verifier <math>\hat V</math> there exists an efficient simulator {{Mvar|S}} (depending on <math>\hat V</math>) that can reproduce the conversation between {{Mvar|P}} and <math>\hat V</math> on any given input. The auxiliary string {{Mvar|z}} in the definition plays the role of "prior knowledge" (including the random coins of <math>\hat V</math>). The definition implies that <math>\hat V</math> cannot use any prior knowledge string {{Mvar|z}} to mine information out of its conversation with {{Mvar|P}}, because if {{Mvar|S}} is also given this prior knowledge then it can reproduce the conversation between <math>\hat V</math> and {{Mvar|P}} just as before. {{citation needed|date=June 2021}}


The definition given is that of perfect zero-knowledge. Computational zero-knowledge is obtained by requiring that the views of the verifier <math>\hat V</math> and the simulator are only [[computational indistinguishability|computationally indistinguishable]], given the auxiliary string. {{citation needed|date=June 2021}}
The definition given is that of perfect zero-knowledge. Computational zero-knowledge is obtained by requiring that the views of the verifier <math>\hat V</math> and the simulator are only [[computational indistinguishability|computationally indistinguishable]], given the auxiliary string.<ref name="Ishai2007">{{cite conference |doi=10.1145/1250790.1250794 |title=Zero-Knowledge from Secure Multiparty Computation |url=https://web.cs.ucla.edu/~rafail/PUBLIC/77.pdf |book-title=STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing |date=2007 |isbn=978-1-59593-631-8 |access-date=2025-09-25 |first1=Yuval |last1=Ishai |first2=Eyal |last2=Kushilevitz |first3=Rafail |last3=Ostrovsky |first4=Amit |last4=Sahai}}</ref>


== Practical examples ==
== Practical examples ==
Line 106: Line 116:
Thus, a cheating prover has a 0.5 probability of successfully cheating in one round. By executing a large-enough number of rounds, the probability of a cheating prover succeeding can be made arbitrarily low.
Thus, a cheating prover has a 0.5 probability of successfully cheating in one round. By executing a large-enough number of rounds, the probability of a cheating prover succeeding can be made arbitrarily low.


To show that the above interactive proof gives zero knowledge other than the fact that Peggy knows {{Mvar|x}}, one can use similar arguments as used in the above proof of completeness and soundness. Specifically, a simulator, say Simon, who does not know {{Mvar|x}}, can simulate the exchange between Peggy and Victor by the following procedure. Firstly, Simon randomly flips a fair coin. If the result is "heads", then he picks a random value {{Mvar|r}}, computes {{Math|1=''C'' = ''g''<sup>''r''</sup> mod ''p''}}, and discloses {{Mvar|C}} as if it is a message from Peggy to Victor. Then Simon also outputs a message "request the value of {{Mvar|r}}" as if it is sent from Victor to Peggy, and immediately outputs the value of {{Mvar|r}} as if it is sent from Peggy to Victor. A single round is complete. On the other hand, if the coin flipping result is "tails", then Simon picks a random number {{Math|''r''&prime;}}, computes {{Math|1=''C''&prime; = ''g''<sup>''r''&prime;</sup> &middot; ''y''<sup>&minus;1</sup> mod ''p''}}, and discloses {{Math|''C''&prime;}} as if it is a message from Peggy to Victor. Then Simon outputs "request the value of {{Math|(''x'' + ''r'') mod (''p'' &minus; 1)}}" as if it is a message from Victor to Peggy. Finally, Simon outputs the value of {{Math|''r''&prime;}} as if it is the response from Peggy back to Victor. A single round is complete. By the previous arguments when proving the completeness and soundness, the interactive communication simulated by Simon is indistinguishable from the true correspondence between Peggy and Victor. The zero-knowledge property is thus guaranteed.
To show that the above interactive proof gives zero knowledge other than the fact that Peggy knows {{Mvar|x}}, one can use similar arguments as used in the above proof of completeness and soundness. Specifically, a simulator, say Simon, who does not know {{Mvar|x}}, can simulate the exchange between Peggy and Victor by the following procedure. Firstly, Simon randomly flips a [[fair coin]]. If the result is "heads", then he picks a random value {{Mvar|r}}, computes {{Math|1=''C'' = ''g''<sup>''r''</sup> mod ''p''}}, and discloses {{Mvar|C}} as if it is a message from Peggy to Victor. Then Simon also outputs a message "request the value of {{Mvar|r}}" as if it is sent from Victor to Peggy, and immediately outputs the value of {{Mvar|r}} as if it is sent from Peggy to Victor. A single round is complete. On the other hand, if the coin flipping result is "tails", then Simon picks a random number {{Math|''r''&prime;}}, computes {{Math|1=''C''&prime; = ''g''<sup>''r''&prime;</sup> &middot; ''y''<sup>&minus;1</sup> mod ''p''}}, and discloses {{Math|''C''&prime;}} as if it is a message from Peggy to Victor. Then Simon outputs "request the value of {{Math|(''x'' + ''r'') mod (''p'' &minus; 1)}}" as if it is a message from Victor to Peggy. Finally, Simon outputs the value of {{Math|''r''&prime;}} as if it is the response from Peggy back to Victor. A single round is complete. By the previous arguments when proving the completeness and soundness, the interactive communication simulated by Simon is indistinguishable from the true correspondence between Peggy and Victor. The zero-knowledge property is thus guaranteed.


=== Hamiltonian cycle for a large graph ===
=== Hamiltonian cycle for a large graph ===
The following scheme is due to [[Manuel Blum]].<ref name="blum86">{{cite journal |first=Manuel |last=Blum |title=How to Prove a Theorem So No One Else Can Claim It |journal=ICM Proceedings |pages=1444–1451 |year=1986 |citeseerx=10.1.1.469.9048 |url=http://euler.nmt.edu/~brian/students/pope.pdf |url-status=live |archiveurl=https://web.archive.org/web/20230103032937/http://euler.nmt.edu/~brian/students/pope.pdf |archivedate=January 3, 2023 }}</ref>
The following scheme is due to [[Manuel Blum]].<ref name="blum86">{{cite journal |first=Manuel |last=Blum |title=How to Prove a Theorem So No One Else Can Claim It |journal=ICM Proceedings |pages=1444–1451 |year=1986 |citeseerx=10.1.1.469.9048 |url=http://euler.nmt.edu/~brian/students/pope.pdf |url-status=live |archive-url=https://web.archive.org/web/20230103032937/http://euler.nmt.edu/~brian/students/pope.pdf |archive-date=January 3, 2023 }}</ref>


In this scenario, Peggy knows a [[Hamiltonian path|Hamiltonian cycle]] for a large [[Graph (discrete mathematics)|graph]] {{mvar|G}}. Victor knows {{mvar|G}} but not the cycle (e.g., Peggy has generated {{mvar|G}} and revealed it to him.) Finding a Hamiltonian cycle given a large graph is believed to be computationally infeasible, since its corresponding decision version is known to be [[NP-complete]]. Peggy will prove that she knows the cycle without simply revealing it (perhaps Victor is interested in buying it but wants verification first, or maybe Peggy is the only one who knows this information and is proving her identity to Victor).
In this scenario, Peggy knows a [[Hamiltonian path|Hamiltonian cycle]] for a large [[Graph (discrete mathematics)|graph]] {{mvar|G}}. Victor knows {{mvar|G}} but not the cycle (e.g., Peggy has generated {{mvar|G}} and revealed it to him.) Finding a Hamiltonian cycle given a large graph is believed to be computationally infeasible, since its corresponding decision version is known to be [[NP-complete]]. Peggy will prove that she knows the cycle without simply revealing it (perhaps Victor is interested in buying it but wants verification first, or maybe Peggy is the only one who knows this information and is proving her identity to Victor).
Line 157: Line 167:


=== Nuclear disarmament ===
=== Nuclear disarmament ===
In 2016, the [[Princeton Plasma Physics Laboratory]] and [[Princeton University]] demonstrated a technique that may have applicability to future [[nuclear disarmament]] talks. It would allow inspectors to confirm whether or not an object is indeed a nuclear weapon without recording, sharing, or revealing the internal workings, which might be secret.<ref>{{cite web|title=PPPL and Princeton demonstrate novel technique that may have applicability to future nuclear disarmament talks - Princeton Plasma Physics Lab|url=http://www.pppl.gov/news/2016/09/pppl-and-princeton-demonstrate-novel-technique-may-have-applicability-future-nuclear|url-status=dead|archive-url=https://web.archive.org/web/20170703142802/https://www.pppl.gov/news/2016/09/pppl-and-princeton-demonstrate-novel-technique-may-have-applicability-future-nuclear|archive-date=2017-07-03|website=www.pppl.gov}}</ref>
In 2016, the [[Princeton Plasma Physics Laboratory]] and [[Princeton University]] demonstrated a technique that may have applicability to future [[nuclear disarmament]] talks. It would allow inspectors to confirm whether or not an object is indeed a nuclear weapon without recording, sharing, or revealing the internal workings, which might be secret.<ref>{{cite web|title=PPPL and Princeton demonstrate novel technique that may have applicability to future nuclear disarmament talks - Princeton Plasma Physics Lab|url=https://www.pppl.gov/news/2022/pppl-and-princeton-demonstrate-novel-technique-may-have-applicability-future-nuclear|archive-url=https://web.archive.org/web/20170703142802/https://www.pppl.gov/news/2016/09/pppl-and-princeton-demonstrate-novel-technique-may-have-applicability-future-nuclear|archive-date=2017-07-03|website=www.pppl.gov}}</ref>


=== Blockchains ===
=== Blockchains ===
Zero-knowledge proofs were applied in the [[Zerocoin protocol|Zerocoin]] and Zerocash protocols, which culminated in the birth of [[Zcoin]]<ref name="Hellwig 2020"/> (later rebranded as [[Firo (cryptocurrency)|Firo]] in 2020)<ref>{{cite web |last1=Hurst |first1=Samantha |title=Zcoin Announces Rebranding to New Name & Ticker "Firo" |date=28 October 2020 |url=https://www.crowdfundinsider.com/2020/10/168504-zcoin-announces-rebranding-to-new-name-ticker-firo/ |publisher=Crowdfund Insider |access-date=4 November 2020 |archive-url=https://web.archive.org/web/20201101141745/https://www.crowdfundinsider.com/2020/10/168504-zcoin-announces-rebranding-to-new-name-ticker-firo/ |archive-date=1 November 2020}}</ref> and [[Zcash]] cryptocurrencies in 2016. Zerocoin has a built-in mixing model that does not trust any peers or centralised mixing providers to ensure anonymity.<ref name="Hellwig 2020"/> Users can transact in a base currency and can cycle the currency into and out of Zerocoins.<ref>{{cite book|last1=Bonneau|first1=J|last2=Miller|first2=A|last3=Clark|first3=J|last4=Narayanan|first4=A|title=2015 IEEE Symposium on Security and Privacy|chapter=SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies|date=2015|chapter-url=https://ieeexplore.ieee.org/document/7163021|location=San Jose, California|pages=104–121|doi=10.1109/SP.2015.14|isbn=978-1-4673-6949-7|s2cid=549362}}</ref> The Zerocash protocol uses a similar model (a variant known as a [[non-interactive zero-knowledge proof]])<ref>{{cite web|last1=Ben-Sasson|first1=Eli|last2=Chiesa|first2=Alessandro|last3=Garman|first3=Christina|last4=Green|first4=Matthew|last5=Miers|first5=Ian|last6=Tromer|first6=Eran|last7=Virza|first7=Madars|title=Zerocash: Decentralized Anonymous Payments from Bitcoin|url=http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf|publisher=IEEE|access-date=26 January 2016|date=18 May 2014}}</ref> except that it can obscure the transaction amount, while Zerocoin cannot. Given significant restrictions of transaction data on the Zerocash network, Zerocash is less prone to privacy timing attacks when compared to Zerocoin. However, this additional layer of privacy can cause potentially undetected hyperinflation of Zerocash supply because fraudulent coins cannot be tracked.<ref name="Hellwig 2020">{{cite book |last1=Hellwig |first1=Daniel |last2=Karlic |first2=Goran |last3=Huchzermeier |first3=Arnd |title=Build Your Own Blockchain |series=Management for Professionals |date=3 May 2020 |publisher=SpringerLink |isbn=9783030401429 |page=112 |chapter-url=https://link.springer.com/chapter/10.1007/978-3-030-40142-9_5 |access-date=3 December 2020 |chapter=Privacy and Anonymity|doi=10.1007/978-3-030-40142-9_5 |s2cid=219058406 }}</ref><ref>{{Cite news|url=https://www.technologyreview.com/s/609448/a-mind-bending-cryptographic-trick-promises-to-take-blockchains-mainstream|title=A mind-bending cryptographic trick promises to take blockchains mainstream|last=Orcutt|first=Mike|work=MIT Technology Review|access-date=2017-12-18|language=en}}</ref>
Zero-knowledge proofs were applied in the [[Zerocoin protocol|Zerocoin]] and Zerocash protocols, which culminated in the birth of [[Zcoin]]<ref name="Hellwig 2020"/> (later rebranded as [[Firo (cryptocurrency)|Firo]] in 2020)<ref>{{cite web |last1=Hurst |first1=Samantha |title=Zcoin Announces Rebranding to New Name & Ticker "Firo" |date=28 October 2020 |url=https://www.crowdfundinsider.com/2020/10/168504-zcoin-announces-rebranding-to-new-name-ticker-firo/ |publisher=Crowdfund Insider |access-date=4 November 2020 |archive-url=https://web.archive.org/web/20201101141745/https://www.crowdfundinsider.com/2020/10/168504-zcoin-announces-rebranding-to-new-name-ticker-firo/ |archive-date=1 November 2020}}</ref> and [[Zcash]] [[Cryptocurrency|cryptocurrencies]] in 2016. Zerocoin has a built-in mixing model that does not trust any peers or centralised mixing providers to ensure anonymity.<ref name="Hellwig 2020"/> Users can transact in a base currency and can cycle the currency into and out of Zerocoins.<ref>{{cite book|last1=Bonneau|first1=J|last2=Miller|first2=A|last3=Clark|first3=J|last4=Narayanan|first4=A|title=2015 IEEE Symposium on Security and Privacy|chapter=SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies|date=2015|location=San Jose, California|pages=104–121|doi=10.1109/SP.2015.14|isbn=978-1-4673-6949-7|s2cid=549362}}</ref> The Zerocash protocol uses a similar model (a variant known as a [[non-interactive zero-knowledge proof]])<ref>{{cite web|last1=Ben-Sasson|first1=Eli|last2=Chiesa|first2=Alessandro|last3=Garman|first3=Christina|last4=Green|first4=Matthew|last5=Miers|first5=Ian|last6=Tromer|first6=Eran|last7=Virza|first7=Madars|title=Zerocash: Decentralized Anonymous Payments from Bitcoin|url=http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf|publisher=IEEE|access-date=26 January 2016|date=18 May 2014}}</ref> except that it can obscure the transaction amount, while Zerocoin cannot. Given significant restrictions of transaction data on the Zerocash network, Zerocash is less prone to privacy timing attacks when compared to Zerocoin. However, this additional layer of privacy can cause potentially undetected hyperinflation of Zerocash supply because fraudulent coins cannot be tracked.<ref name="Hellwig 2020">{{cite book |last1=Hellwig |first1=Daniel |last2=Karlic |first2=Goran |last3=Huchzermeier |first3=Arnd |title=Build Your Own Blockchain |series=Management for Professionals |date=3 May 2020 |publisher=SpringerLink |isbn=978-3-030-40142-9 |page=112 |chapter-url=https://link.springer.com/chapter/10.1007/978-3-030-40142-9_5 |access-date=3 December 2020 |chapter=Privacy and Anonymity|doi=10.1007/978-3-030-40142-9_5 |s2cid=219058406 }}</ref><ref>{{Cite news|url=https://www.technologyreview.com/s/609448/a-mind-bending-cryptographic-trick-promises-to-take-blockchains-mainstream|title=A mind-bending cryptographic trick promises to take blockchains mainstream|last=Orcutt|first=Mike|work=MIT Technology Review|access-date=2017-12-18|language=en}}</ref>


In 2018, Bulletproofs were introduced. Bulletproofs are an improvement from non-interactive zero-knowledge proofs where a trusted setup is not needed.<ref name="Bulletproofs">{{cite book |last1=Bünz |first1=B |last2=Bootle |first2=D |last3=Boneh |first3=A |title=2018 IEEE Symposium on Security and Privacy (SP) |chapter=Bulletproofs: Short Proofs for Confidential Transactions and More |date=2018 |pages=315–334 |doi=10.1109/SP.2018.00020 |location=San Francisco, California|isbn=978-1-5386-4353-2 |s2cid=3337741 |doi-access=free }}</ref> It was later implemented into the [[Mimblewimble]] protocol (which the Grin and Beam cryptocurrencies are based upon) and [[Monero (cryptocurrency)|Monero cryptocurrency]].<ref>{{cite web |last1=Odendaal |first1=Hansie |last2=Sharrock |first2=Cayle |last3=Heerden |first3=SW |title=Bulletproofs and Mimblewimble |url=https://tlu.tarilabs.com/cryptography/bulletproofs-and-mimblewimble/MainReport.html#current-and-past-efforts |publisher=Tari Labs University |access-date=3 December 2020 |archive-url=https://web.archive.org/web/20200929160834/https://tlu.tarilabs.com/cryptography/bulletproofs-and-mimblewimble/MainReport.html |archive-date=29 September 2020}}</ref> In 2019, Firo implemented the Sigma protocol, which is an improvement on the Zerocoin protocol without trusted setup.<ref>{{cite news |last1=Andrew |first1=Munro |title=Zcoin cryptocurrency introduces zero knowledge proofs with no trusted set-up |url=https://www.finder.com.au/zcoin-cryptocurrency-introduces-zero-knowledge-proofs-with-no-trusted-setup |access-date=30 July 2019 |publisher=Finder Australia |date=30 July 2019 |archive-url=https://web.archive.org/web/20190730210721/https://www.finder.com.au/zcoin-cryptocurrency-introduces-zero-knowledge-proofs-with-no-trusted-setup |archive-date=30 July 2019}}</ref><ref name=":1">{{cite book |last1=Groth |first1=J |last2=Kohlweiss |first2=M |title=Advances in Cryptology - EUROCRYPT 2015 |chapter=One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin |series=Lecture Notes in Computer Science |date=14 April 2015 |volume=9057 |pages=253–280 |doi=10.1007/978-3-662-46803-6_9 |publisher=EUROCRYPT 2015 |location=Berlin, Heidelberg|hdl=20.500.11820/f6ec5d8f-cfda-4f56-9bd0-d9222b8d9a43 |isbn=978-3-662-46802-9 |s2cid=16708805 |chapter-url=https://www.research.ed.ac.uk/en/publications/f6ec5d8f-cfda-4f56-9bd0-d9222b8d9a43 |hdl-access=free }}</ref> In the same year, Firo introduced the Lelantus protocol, an improvement on the Sigma protocol, where the former hides the origin and amount of a transaction.<ref>{{cite journal |last1=Aram |first1=Jivanyan |title=Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions |journal=Cryptology ePrint Archive |date=7 April 2019 |issue=Report 373 |url=https://eprint.iacr.org/2019/373 |access-date=14 April 2019}}</ref>
In 2018, Bulletproofs were introduced. Bulletproofs are an improvement from non-interactive zero-knowledge proofs where a trusted setup is not needed.<ref name="Bulletproofs">{{cite book |last1=Bünz |first1=B |last2=Bootle |first2=D |last3=Boneh |first3=A |title=2018 IEEE Symposium on Security and Privacy (SP) |chapter=Bulletproofs: Short Proofs for Confidential Transactions and More |date=2018 |pages=315–334 |doi=10.1109/SP.2018.00020 |location=San Francisco, California|isbn=978-1-5386-4353-2 |s2cid=3337741 |doi-access=free }}</ref> It was later implemented into the [[Mimblewimble]] protocol (which the Grin and Beam cryptocurrencies are based upon) and [[Monero (cryptocurrency)|Monero cryptocurrency]].<ref>{{cite web |last1=Odendaal |first1=Hansie |last2=Sharrock |first2=Cayle |last3=Heerden |first3=SW |title=Bulletproofs and Mimblewimble |url=https://tlu.tarilabs.com/cryptography/bulletproofs-and-mimblewimble/MainReport.html#current-and-past-efforts |publisher=Tari Labs University |access-date=3 December 2020 |archive-url=https://web.archive.org/web/20200929160834/https://tlu.tarilabs.com/cryptography/bulletproofs-and-mimblewimble/MainReport.html |archive-date=29 September 2020}}</ref> In 2019, Firo implemented the Sigma protocol, which is an improvement on the Zerocoin protocol without trusted setup.<ref>{{cite news |last1=Andrew |first1=Munro |title=Zcoin cryptocurrency introduces zero knowledge proofs with no trusted set-up |url=https://www.finder.com.au/zcoin-cryptocurrency-introduces-zero-knowledge-proofs-with-no-trusted-setup |access-date=30 July 2019 |publisher=Finder Australia |date=30 July 2019 |archive-url=https://web.archive.org/web/20190730210721/https://www.finder.com.au/zcoin-cryptocurrency-introduces-zero-knowledge-proofs-with-no-trusted-setup |archive-date=30 July 2019}}</ref><ref name=":1">{{cite book |last1=Groth |first1=J |last2=Kohlweiss |first2=M |title=Advances in Cryptology - EUROCRYPT 2015 |chapter=One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin |series=Lecture Notes in Computer Science |date=14 April 2015 |volume=9057 |pages=253–280 |doi=10.1007/978-3-662-46803-6_9 |publisher=EUROCRYPT 2015 |location=Berlin, Heidelberg|hdl=20.500.11820/f6ec5d8f-cfda-4f56-9bd0-d9222b8d9a43 |isbn=978-3-662-46802-9 |s2cid=16708805 |chapter-url=https://www.research.ed.ac.uk/en/publications/f6ec5d8f-cfda-4f56-9bd0-d9222b8d9a43 |hdl-access=free }}</ref> In the same year, Firo introduced the Lelantus protocol, an improvement on the Sigma protocol, where the former hides the origin and amount of a transaction.<ref>{{cite journal |last1=Aram |first1=Jivanyan |title=Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions |journal=Cryptology ePrint Archive |date=7 April 2019 |issue=Report 373 |url=https://eprint.iacr.org/2019/373 |access-date=14 April 2019}}</ref>
A related line of work applies zero-knowledge proofs to database analytics via so-called zero-knowledge "coprocessors": off-chain systems that execute queries and return both the result and a proof that the computation was performed correctly on untampered data. Academic prototypes have shown how to produce ZK proofs for ad-hoc SQL queries while hiding inputs and guaranteeing correctness of the result (e.g., ZKSQL).<ref>{{cite journal |last1=Li |first1=X. |last2=others |title=ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs |journal=Proceedings of the VLDB Endowment |volume=16 |pages=1804–1817 |year=2023 |issue=8 |doi=10.14778/3594512.3594513 |url=https://www.vldb.org/pvldb/vol16/p1804-li.pdf}}</ref> One implementation of this approach, termed "Proof of SQL", has been reported in industry media as enabling sub-second ZK proving for SQL query results and making the prover available as open source.<ref>{{cite news |title=Protocol Village: Space and Time Releases 'Proof of SQL v1' With Sub-Second ZK Prover |work=CoinDesk |date=12 June 2024 |url=https://www.coindesk.com/tech/2024/06/11/protocol-village}}</ref><ref>{{cite news |title=New open-source ZK-proof slashes SQL query times |work=Cointelegraph |date=12 June 2024 |url=https://cointelegraph.com/news/open-source-zk-proof-slashes-sql-query-times-sub-seconds}}</ref> Earlier coverage also described the concept under development as a [[cryptographic protocol]] allowing decentralized applications to verify that SQL results have not been tampered with.<ref>{{cite news |last=Betz |first=Brandy |title=Decentralized Data Platform Space and Time Raises $10M |work=CoinDesk |date=28 July 2022 |url=https://www.coindesk.com/business/2022/07/28/decentralized-data-platform-space-and-time-raises-10m}}</ref><ref>{{cite news |title=Microsoft's M12 leads Space and Time's $20 million raise to bring SQL to Web3 |work=The Block |date=27 September 2022 |url=https://www.theblock.co/post/172780/microsofts-m12-leads-space-and-times-20-million-raise-to-bring-sql-to-web3}}</ref>


=== Decentralized Identifiers ===
=== Decentralized Identifiers ===
Zero-knowledge proofs by their nature can enhance privacy in identity-sharing systems, which are vulnerable to data breaches and identity theft. When integrated to a [[Decentralized identifier|decentralized identifier]] system, ZKPs add an extra layer of encryption on DID documents.<ref>{{Cite journal |last1=Zhou |first1=Lu |last2=Diro |first2=Abebe |last3=Saini |first3=Akanksha |last4=Kaisar |first4=Shahriar |last5=Hiep |first5=Pham Cong |date=2024-02-01 |title=Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities |journal=Journal of Information Security and Applications |volume=80 |pages=103678 |doi=10.1016/j.jisa.2023.103678 |issn=2214-2126|doi-access=free }}</ref>
Zero-knowledge proofs by their nature can enhance privacy in identity-sharing systems, which are vulnerable to data breaches and identity theft. When integrated to a [[Decentralized identifier|decentralized identifier]] system, ZKPs add an extra layer of encryption on DID documents.<ref>{{Cite journal |last1=Zhou |first1=Lu |last2=Diro |first2=Abebe |last3=Saini |first3=Akanksha |last4=Kaisar |first4=Shahriar |last5=Hiep |first5=Pham Cong |date=2024-02-01 |title=Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities |journal=Journal of Information Security and Applications |volume=80 |article-number=103678 |doi=10.1016/j.jisa.2023.103678 |issn=2214-2126|doi-access=free }}</ref>


== History  ==
== History  ==
Line 173: Line 185:


<blockquote>
<blockquote>
Of particular interest is the case where this additional knowledge is essentially 0 and we show that [it] is possible to interactively prove that a number is quadratic non residue mod ''m'' releasing 0 additional knowledge. This is surprising as no efficient algorithm for deciding quadratic residuosity mod ''m'' is known when ''m''’s factorization is not given. Moreover, all known ''NP'' proofs for this problem exhibit the prime factorization of ''m''. This indicates that adding interaction to the proving process, may decrease the amount of knowledge that must be communicated in order to prove a theorem.
Of particular interest is the case where this additional knowledge is essentially 0 and we show that [it] is possible to interactively prove that a number is quadratic non residue mod ''m'' releasing 0 additional knowledge. This is surprising as no efficient algorithm for deciding quadratic residuosity mod ''m'' is known when ''m''<nowiki />'s factorization is not given. Moreover, all known ''NP'' proofs for this problem exhibit the prime factorization of ''m''. This indicates that adding interaction to the proving process, may decrease the amount of knowledge that must be communicated in order to prove a theorem.
</blockquote>
</blockquote>


Line 180: Line 192:
[[Oded Goldreich]], [[Silvio Micali]], and [[Avi Wigderson]] took this one step further, showing that, assuming the existence of unbreakable encryption, one can create a zero-knowledge proof system for the NP-complete [[graph coloring problem]] with three colors. Since every problem in NP can be efficiently reduced to this problem, this means that, under this assumption, all problems in NP have zero-knowledge proofs.<ref>{{cite journal |first1=Oded |last1=Goldreich |first2=Silvio |last2=Micali |first3=Avi |last3=Wigderson |title=Proofs that yield nothing but their validity |journal=Journal of the ACM |volume=38 |issue=3 |pages=690–728 |doi=10.1145/116825.116852 |year=1991 |citeseerx=10.1.1.420.1478 |s2cid=2389804 }}</ref> The reason for the assumption is that, as in the above example, their protocols require encryption. A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of [[one-way function]]s, but it is conceivable that some physical means might also achieve it.
[[Oded Goldreich]], [[Silvio Micali]], and [[Avi Wigderson]] took this one step further, showing that, assuming the existence of unbreakable encryption, one can create a zero-knowledge proof system for the NP-complete [[graph coloring problem]] with three colors. Since every problem in NP can be efficiently reduced to this problem, this means that, under this assumption, all problems in NP have zero-knowledge proofs.<ref>{{cite journal |first1=Oded |last1=Goldreich |first2=Silvio |last2=Micali |first3=Avi |last3=Wigderson |title=Proofs that yield nothing but their validity |journal=Journal of the ACM |volume=38 |issue=3 |pages=690–728 |doi=10.1145/116825.116852 |year=1991 |citeseerx=10.1.1.420.1478 |s2cid=2389804 }}</ref> The reason for the assumption is that, as in the above example, their protocols require encryption. A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of [[one-way function]]s, but it is conceivable that some physical means might also achieve it.


On top of this, they also showed that the [[graph nonisomorphism problem]], the [[complement (complexity)|complement]] of the [[graph isomorphism problem]], has a zero-knowledge proof. This problem is in co-NP, but is not currently known to be in either NP or any practical class. More generally, [[Russell Impagliazzo]] and [[Moti Yung]] as well as Ben-Or et al. would go on to show that, also assuming one-way functions or unbreakable encryption, there are zero-knowledge proofs for ''all'' problems in IP&nbsp;=&nbsp;PSPACE, or in other words, anything that can be proved by an interactive proof system can be proved with zero knowledge.<ref>Russell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40–51</ref><ref>{{cite book |first1=Michael |last1=Ben-Or |first2=Oded |last2=Goldreich |first3=Shafi |last3=Goldwasser |first4=Johan |last4=Hastad |first5=Joe |last5=Kilian |first6=Silvio |last6=Micali |first7=Phillip |last7=Rogaway |chapter=Everything provable is provable in zero-knowledge |editor-first=S. |editor-last=Goldwasser |title=Advances in Cryptology – CRYPTO '88 |volume=403 |series=Lecture Notes in Computer Science |pages=37–56 |publisher=Springer-Verlag |year=1990 }}</ref>
On top of this, they also showed that the [[graph nonisomorphism problem]], the [[complement (complexity)|complement]] of the [[graph isomorphism problem]], has a zero-knowledge proof. This problem is in co-NP, but is not currently known to be in either NP or any practical class. More generally, [[Russell Impagliazzo]] and [[Moti Yung]] as well as Ben-Or et al. would go on to show that, also assuming one-way functions or unbreakable encryption, there are zero-knowledge proofs for ''all'' problems in IP&nbsp;=&nbsp;[[PSPACE]], or in other words, anything that can be proved by an interactive proof system can be proved with zero knowledge.<ref>Russell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40–51</ref><ref>{{cite book |first1=Michael |last1=Ben-Or |first2=Oded |last2=Goldreich |first3=Shafi |last3=Goldwasser |first4=Johan |last4=Hastad |first5=Joe |last5=Kilian |first6=Silvio |last6=Micali |first7=Phillip |last7=Rogaway |chapter=Everything provable is provable in zero-knowledge |editor-first=S. |editor-last=Goldwasser |title=Advances in Cryptology – CRYPTO '88 |volume=403 |series=Lecture Notes in Computer Science |pages=37–56 |publisher=Springer-Verlag |year=1990 }}</ref>


Not liking to make unnecessary assumptions, many theorists sought a way to eliminate the necessity of [[one way function]]s. One way this was done was with ''multi-prover interactive proof systems'' (see [[interactive proof system]]), which have multiple independent provers instead of only one, allowing the verifier to "cross-examine" the provers in isolation to avoid being misled. It can be shown that, without any intractability assumptions, all languages in NP have zero-knowledge proofs in such a system.<ref>{{cite book | chapter-url=https://doi.org/10.1145/62212.62223 | doi=10.1145/62212.62223 | chapter=Multi-prover interactive proofs: How to remove intractability | title=Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC '88 | date=1988 | last1=Ben-Or | first1=Michael | last2=Goldwasser | first2=Shafi | last3=Kilian | first3=Joe | last4=Widgerson | first4=Avi | pages=113–131 | isbn=0-89791-264-0 }}</ref>
Not liking to make unnecessary assumptions, many theorists sought a way to eliminate the necessity of [[one way function]]s. One way this was done was with ''multi-prover interactive proof systems'' (see [[interactive proof system]]), which have multiple independent provers instead of only one, allowing the verifier to "cross-examine" the provers in isolation to avoid being misled. It can be shown that, without any intractability assumptions, all languages in NP have zero-knowledge proofs in such a system.<ref>{{cite book | chapter-url=https://doi.org/10.1145/62212.62223 | doi=10.1145/62212.62223 | chapter=Multi-prover interactive proofs: How to remove intractability | title=Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC '88 | date=1988 | last1=Ben-Or | first1=Michael | last2=Goldwasser | first2=Shafi | last3=Kilian | first3=Joe | last4=Widgerson | first4=Avi | pages=113–131 | isbn=0-89791-264-0 }}</ref>


It turns out that, in an Internet-like setting, where multiple protocols may be executed concurrently, building zero-knowledge proofs is more challenging. The line of research investigating concurrent zero-knowledge proofs was initiated by the work of [[Cynthia Dwork|Dwork]], [[Moni Naor|Naor]], and [[Amit Sahai|Sahai]].<ref>{{cite journal |first1=Cynthia |last1=Dwork |first2=Moni |last2=Naor |first3=Amit |last3=Sahai |title=Concurrent Zero Knowledge |journal=Journal of the ACM |volume=51 |issue=6 |pages=851–898 |year=2004 |doi=10.1145/1039488.1039489 |citeseerx=10.1.1.43.716 |s2cid=52827731 }}</ref> One particular development along these lines has been the development of [[witness-indistinguishable proof]] protocols. The property of witness-indistinguishability is related to that of zero-knowledge, yet witness-indistinguishable protocols do not suffer from the same problems of concurrent execution.<ref>{{cite book |first1=Uriel |last1=Feige |first2=Adi |last2=Shamir |title=Proceedings of the twenty-second annual ACM symposium on Theory of computing - STOC '90 |chapter=Witness indistinguishable and witness hiding protocols |date=1990 |pages=416–426 |doi=10.1145/100216.100272 |isbn=978-0897913614 |citeseerx=10.1.1.73.3911 |s2cid=11146395 }}</ref>
It turns out that, in an Internet-like setting, where multiple protocols may be executed concurrently, building zero-knowledge proofs is more challenging. The line of research investigating concurrent zero-knowledge proofs was initiated by the work of [[Cynthia Dwork|Dwork]], [[Moni Naor|Naor]], and [[Amit Sahai|Sahai]].<ref>{{cite journal |first1=Cynthia |last1=Dwork |first2=Moni |last2=Naor |first3=Amit |last3=Sahai |title=Concurrent Zero Knowledge |journal=Journal of the ACM |volume=51 |issue=6 |pages=851–898 |year=2004 |doi=10.1145/1039488.1039489 |citeseerx=10.1.1.43.716 |s2cid=52827731 }}</ref> One particular development along these lines has been the development of [[witness-indistinguishable proof]] protocols. The property of witness-indistinguishability is related to that of zero-knowledge, yet witness-indistinguishable protocols do not suffer from the same problems of concurrent execution.<ref>{{cite book |first1=Uriel |last1=Feige |first2=Adi |last2=Shamir |title=Proceedings of the twenty-second annual ACM symposium on Theory of computing - STOC '90 |chapter=Witness indistinguishable and witness hiding protocols |date=1990 |pages=416–426 |doi=10.1145/100216.100272 |isbn=978-0-89791-361-4 |citeseerx=10.1.1.73.3911 |s2cid=11146395 }}</ref>


Another variant of zero-knowledge proofs are [[non-interactive zero-knowledge proof]]s. Blum, Feldman, and Micali showed that a common random string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction.<ref name="noninteractive" /><ref name="noninteractive2" />
Another variant of zero-knowledge proofs are [[non-interactive zero-knowledge proof]]s. Blum, Feldman, and Micali showed that a common random string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction.<ref name="noninteractive" /><ref name="noninteractive2" />


== Zero-Knowledge Proof protocols ==
== Zero-Knowledge Proof protocols ==
The most popular interactive or [[non-interactive zero-knowledge proof]] (e.g., zk-SNARK) protocols can be broadly categorized in the following four categories: Succinct Non-Interactive ARguments of Knowledge (SNARK), Scalable Transparent ARgument of Knowledge (STARK), Verifiable Polynomial Delegation (VPD), and Succinct Non-interactive ARGuments (SNARG). A list of zero-knowledge proof protocols and libraries is provided below along with comparisons based on '''transparency''', '''universality''', '''plausible post-quantum security''', and '''programming paradigm'''.<ref name=mouris21>{{cite journal |last1=Mouris |first1=Dimitris |last2=Tsoutsos |first2=Nektarios Georgios |title=Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs |journal=IEEE Transactions on Information Forensics and Security |date=2021 |volume=16 |pages=3269–3284 |doi=10.1109/TIFS.2021.3074869 |s2cid=222069813 |url=https://ieeexplore.ieee.org/document/9410618 |issn=1556-6021|url-access=subscription }}</ref> A transparent protocol is one that does not require any trusted setup and uses public randomness. A universal protocol is one that does not require a separate trusted setup for each circuit. Finally, a plausibly post-quantum protocol is one that is not susceptible to known attacks involving quantum algorithms.
The most popular interactive or [[non-interactive zero-knowledge proof]] (e.g., zk-SNARK) protocols can be broadly categorized in the following four categories: Succinct Non-Interactive ARguments of Knowledge (SNARK), Scalable Transparent ARgument of Knowledge (STARK), Verifiable Polynomial Delegation (VPD), and Succinct Non-interactive ARGuments (SNARG). A list of zero-knowledge proof protocols and libraries is provided below along with comparisons based on '''transparency''', '''universality''', '''plausible post-quantum security''', and '''programming paradigm'''.<ref name=mouris21>{{cite journal |last1=Mouris |first1=Dimitris |last2=Tsoutsos |first2=Nektarios Georgios |title=Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs |journal=IEEE Transactions on Information Forensics and Security |date=2021 |volume=16 |pages=3269–3284 |doi=10.1109/TIFS.2021.3074869 |bibcode=2021ITIF...16.3269M |s2cid=222069813 |issn=1556-6021}}</ref> A transparent protocol is one that does not require any trusted setup and uses public randomness. A universal protocol is one that does not require a separate trusted setup for each circuit. Finally, a plausibly post-quantum protocol is one that is not susceptible to known attacks involving [[Quantum algorithm|quantum algorithms]].


{| class="wikitable"
{| class="wikitable"
Line 209: Line 221:
| vRAM<ref>{{cite book |last1=Zhang |first1=Yupeng |last2=Genkin |first2=Daniel |last3=Katz |first3=Jonathan |last4=Papadopoulos |first4=Dimitrios |last5=Papamanthou |first5=Charalampos |title=2018 IEEE Symposium on Security and Privacy (SP) |chapter=VRAM: Faster Verifiable RAM with Program-Independent Preprocessing |date=May 2018 |pages=908–925 |doi=10.1109/SP.2018.00013|isbn=978-1-5386-4353-2 |doi-access=free }}</ref> || 2018 || zk-SNARG || {{No}} || {{Yes}} || {{No}} || Assembly
| vRAM<ref>{{cite book |last1=Zhang |first1=Yupeng |last2=Genkin |first2=Daniel |last3=Katz |first3=Jonathan |last4=Papadopoulos |first4=Dimitrios |last5=Papamanthou |first5=Charalampos |title=2018 IEEE Symposium on Security and Privacy (SP) |chapter=VRAM: Faster Verifiable RAM with Program-Independent Preprocessing |date=May 2018 |pages=908–925 |doi=10.1109/SP.2018.00013|isbn=978-1-5386-4353-2 |doi-access=free }}</ref> || 2018 || zk-SNARG || {{No}} || {{Yes}} || {{No}} || Assembly
|-
|-
| vnTinyRAM<ref>{{cite journal |last1=Ben-Sasson |first1=Eli |last2=Chiesa |first2=Alessandro |last3=Tromer |first3=Eran |last4=Virza |first4=Madars |title=Succinct non-interactive zero knowledge for a von Neumann architecture |journal=Proceedings of the 23rd USENIX Conference on Security Symposium |date=20 August 2014 |pages=781–796 |url=https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/ben-sasson |publisher=USENIX Association|isbn=9781931971157 }}</ref> || 2014 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Procedural
| vnTinyRAM<ref>{{cite journal |last1=Ben-Sasson |first1=Eli |last2=Chiesa |first2=Alessandro |last3=Tromer |first3=Eran |last4=Virza |first4=Madars |title=Succinct non-interactive zero knowledge for a von Neumann architecture |journal=Proceedings of the 23rd USENIX Conference on Security Symposium |date=20 August 2014 |pages=781–796 |url=https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/ben-sasson |publisher=USENIX Association|isbn=978-1-931971-15-7 }}</ref> || 2014 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Procedural
|-
|-
| MIRAGE<ref>{{cite journal |last1=Kosba |first1=Ahmed |last2=Papadopoulos |first2=Dimitrios |last3=Papamanthou |first3=Charalampos |last4=Song |first4=Dawn |title=MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs |journal=Cryptology ePrint Archive |date=2020 |url=https://eprint.iacr.org/2020/278}}</ref> || 2020 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
| MIRAGE<ref>{{cite journal |last1=Kosba |first1=Ahmed |last2=Papadopoulos |first2=Dimitrios |last3=Papamanthou |first3=Charalampos |last4=Song |first4=Dawn |title=MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs |journal=Cryptology ePrint Archive |date=2020 |url=https://eprint.iacr.org/2020/278}}</ref> || 2020 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
|-
|-
| Sonic<ref>{{cite book |last1=Maller |first1=Mary |last2=Bowe |first2=Sean |last3=Kohlweiss |first3=Markulf |last4=Meiklejohn |first4=Sarah |title=Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security |chapter=Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings |date=6 November 2019 |pages=2111–2128 |doi=10.1145/3319535.3339817 |chapter-url=https://doi.org/10.1145/3319535.3339817 |publisher=Association for Computing Machinery|hdl=20.500.11820/739b94f1-54f0-4ec3-9644-3c95eea1e8f5 |isbn=9781450367479 |s2cid=242772913 |url=https://www.research.ed.ac.uk/en/publications/739b94f1-54f0-4ec3-9644-3c95eea1e8f5 |hdl-access=free }}</ref> || 2019 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
| Sonic<ref>{{cite book |last1=Maller |first1=Mary |last2=Bowe |first2=Sean |last3=Kohlweiss |first3=Markulf |last4=Meiklejohn |first4=Sarah |title=Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security |chapter=Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings |date=6 November 2019 |pages=2111–2128 |doi=10.1145/3319535.3339817 |chapter-url=https://doi.org/10.1145/3319535.3339817 |publisher=Association for Computing Machinery|hdl=20.500.11820/739b94f1-54f0-4ec3-9644-3c95eea1e8f5 |isbn=978-1-4503-6747-9 |s2cid=242772913 |url=https://www.research.ed.ac.uk/en/publications/739b94f1-54f0-4ec3-9644-3c95eea1e8f5 |hdl-access=free }}</ref> || 2019 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
|-
|-
| Marlin<ref>{{cite book |last1=Chiesa |first1=Alessandro |last2=Hu |first2=Yuncong |last3=Maller |first3=Mary |last4=Mishra |first4=Pratyush |last5=Vesely |first5=Noah |last6=Ward |first6=Nicholas |title=Advances in Cryptology – EUROCRYPT 2020 |chapter=Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS |series=Lecture Notes in Computer Science |date=2020 |volume=12105 |pages=738–768 |doi=10.1007/978-3-030-45721-1_26 |chapter-url=https://link.springer.com/chapter/10.1007/978-3-030-45721-1_26 |publisher=Springer International Publishing |isbn=978-3-030-45720-4 |s2cid=204772154 |language=en}}</ref> || 2020 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
| Marlin<ref>{{cite book |last1=Chiesa |first1=Alessandro |last2=Hu |first2=Yuncong |last3=Maller |first3=Mary |last4=Mishra |first4=Pratyush |last5=Vesely |first5=Noah |last6=Ward |first6=Nicholas |title=Advances in Cryptology – EUROCRYPT 2020 |chapter=Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS |series=Lecture Notes in Computer Science |date=2020 |volume=12105 |pages=738–768 |doi=10.1007/978-3-030-45721-1_26 |chapter-url=https://link.springer.com/chapter/10.1007/978-3-030-45721-1_26 |publisher=Springer International Publishing |isbn=978-3-030-45720-4 |s2cid=204772154 |language=en}}</ref> || 2020 || zk-SNARK || {{No}} || {{Yes}} || {{No}} || Arithmetic Circuits
Line 229: Line 241:
| Virgo<ref>{{cite book |last1=Zhang |first1=Jiaheng |last2=Xie |first2=Tiancheng |last3=Zhang |first3=Yupeng |last4=Song |first4=Dawn |title=2020 IEEE Symposium on Security and Privacy (SP) |chapter=Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof |date=May 2020 |pages=859–876 |doi=10.1109/SP40000.2020.00052 |isbn=978-1-7281-3497-0 |doi-access=free }}</ref> || 2020 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
| Virgo<ref>{{cite book |last1=Zhang |first1=Jiaheng |last2=Xie |first2=Tiancheng |last3=Zhang |first3=Yupeng |last4=Song |first4=Dawn |title=2020 IEEE Symposium on Security and Privacy (SP) |chapter=Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof |date=May 2020 |pages=859–876 |doi=10.1109/SP40000.2020.00052 |isbn=978-1-7281-3497-0 |doi-access=free }}</ref> || 2020 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
|-
|-
| Ligero<ref>{{cite book |last1=Ames |first1=Scott |last2=Hazay |first2=Carmit |last3=Ishai |first3=Yuval |last4=Venkitasubramaniam |first4=Muthuramakrishnan |title=Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |chapter=Ligero |date=30 October 2017 |pages=2087–2104 |doi=10.1145/3133956.3134104 |chapter-url=https://dl.acm.org/doi/10.1145/3133956.3134104 |publisher=Association for Computing Machinery|isbn=9781450349468 |s2cid=5348527 }}</ref> || 2017 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
| Ligero<ref>{{cite book |last1=Ames |first1=Scott |last2=Hazay |first2=Carmit |last3=Ishai |first3=Yuval |last4=Venkitasubramaniam |first4=Muthuramakrishnan |title=Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |chapter=Ligero |date=30 October 2017 |pages=2087–2104 |doi=10.1145/3133956.3134104 |chapter-url=https://dl.acm.org/doi/10.1145/3133956.3134104 |publisher=Association for Computing Machinery|isbn=978-1-4503-4946-8 |s2cid=5348527 }}</ref> || 2017 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
|-
|-
| Aurora<ref>{{cite book |last1=Ben-Sasson |first1=Eli |last2=Chiesa |first2=Alessandro |last3=Riabzev |first3=Michael |last4=Spooner |first4=Nicholas |last5=Virza |first5=Madars |last6=Ward |first6=Nicholas P. |title=Advances in Cryptology – EUROCRYPT 2019 |chapter=Aurora: Transparent Succinct Arguments for R1CS |series=Lecture Notes in Computer Science |date=2019 |volume=11476 |pages=103–128 |doi=10.1007/978-3-030-17653-2_4 |chapter-url=https://link.springer.com/chapter/10.1007%2F978-3-030-17653-2_4 |publisher=Springer International Publishing |isbn=978-3-030-17652-5 |s2cid=52832327 |language=en}}</ref> || 2019 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
| Aurora<ref>{{cite book |last1=Ben-Sasson |first1=Eli |last2=Chiesa |first2=Alessandro |last3=Riabzev |first3=Michael |last4=Spooner |first4=Nicholas |last5=Virza |first5=Madars |last6=Ward |first6=Nicholas P. |title=Advances in Cryptology – EUROCRYPT 2019 |chapter=Aurora: Transparent Succinct Arguments for R1CS |series=Lecture Notes in Computer Science |date=2019 |volume=11476 |pages=103–128 |doi=10.1007/978-3-030-17653-2_4 |chapter-url=https://link.springer.com/chapter/10.1007%2F978-3-030-17653-2_4 |publisher=Springer International Publishing |isbn=978-3-030-17652-5 |s2cid=52832327 |language=en}}</ref> || 2019 || zk-SNARK || {{Yes}} || {{Yes}} || {{Yes}} || Arithmetic Circuits
Line 236: Line 248:
|-
|-
| Zilch<ref name=mouris21 /> || 2021 || zk-STARK || {{Yes}} || {{Yes}} || {{Yes}} || Object-Oriented
| Zilch<ref name=mouris21 /> || 2021 || zk-STARK || {{Yes}} || {{Yes}} || {{Yes}} || Object-Oriented
|-
|Hyperbridge<ref>{{Cite web|title=Hyperbridge says it is building a hyperstructure for crypto bridges|url=https://techcabal.com/2025/11/25/hyperbridge-wants-to-end-bridge-hacks/|website=TechCabal|date=2025-11-25|access-date=2025-12-01|language=en-US|first=Emmanuel|last=Nwosu}}</ref>
|2024
|zk-SNARK
| {{Yes}}
| {{Yes}}
| {{Yes}}
|Arithmetic Circuits
|}
|}



Latest revision as of 00:40, 21 December 2025

Template:Short description

In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information beyond the mere fact of that statement's truth.[1] The intuition behind the nontriviality of zero-knowledge proofs is that it is trivial to prove possession of the relevant information simply by revealing it; the hard part is to prove this possession without revealing this information (or any aspect of it whatsoever).[2]

In light of the fact that one should be able to generate a proof of some statement only when in possession of certain secret information connected to the statement, the verifier, even after having become convinced of the statement's truth by means of a zero-knowledge proof, should nonetheless remain unable to prove the statement to further third parties.

Zero-knowledge proofs can be interactive, meaning that the prover and verifier exchange messages according to some protocol, or noninteractive, meaning that the verifier is convinced by a single prover message and no other communication is needed. In the standard model, interaction is required, except for trivial proofs of BPP problems.[3] In the common random string and random oracle models, non-interactive zero-knowledge proofs exist. The Fiat–Shamir heuristic can be used to transform certain interactive zero-knowledge proofs into noninteractive ones.[4][5][6]

Abstract examples

The red card proof

One example of a math-free zero knowledge proof is if Peggy wants to prove to Victor that she has drawn a red card from a standard deck of 52 playing cards, without revealing which specific red card she holds. Victor observes Peggy draw a card at random from the shuffled deck, but she keeps the card face-down so he cannot see it.

To prove her card is red without revealing its identity, Peggy takes the remaining 51 cards from the deck and systematically shows Victor all 26 black cards (the 13 spades and 13 clubs) one by one, placing them face-up on the table. Since a standard deck contains exactly 26 red cards and 26 black cards, and Peggy has demonstrated that all the black cards remain in the deck, Victor can conclude with certainty that Peggy's hidden card must be red.

This proof is zero-knowledge because Victor learns only that Peggy's card is red, but gains no information about whether it is a heart or diamond, or which specific red card she holds. The proof would be equally convincing whether Peggy held the Ace of Hearts or the Two of Diamonds. Furthermore, even if the interaction were recorded, the recording would not reveal Peggy's specific card to future observers, maintaining the zero-knowledge property.

If Peggy was lying and actually held a black card, she would be unable to produce all 26 black cards from the remaining deck, making deception impossible. This demonstrates the soundness of the proof system. This type of physical zero-knowledge proof using standard playing cards belongs to a broader class of card-based cryptographic protocols that allow participants to perform secure computations using everyday objects.[7]

Where's Wally

Another well-known example of a zero-knowledge proof is the "Where's Wally" example. In this example, the prover wants to prove to the verifier that they know where Wally is on a page in a Where's Wally? book, without revealing his location to the verifier.[8]

The prover starts by taking a large black board with a small hole in it, the size of Wally. The board is twice the size of the book in both directions, so the verifier cannot see where on the page the prover is placing it. The prover then places the board over the page so that Wally is in the hole.[8]

The verifier can now look through the hole and see Wally, but cannot see any other part of the page. Therefore, the prover has proven to the verifier that they know where Wally is, without revealing any other information about his location.[8]

This example is not a perfect zero-knowledge proof, because the prover does reveal some information about Wally's location, such as his body position. However, it is a decent illustration of the basic concept of a zero-knowledge proof.

The Ali Baba cave

Script error: No such module "Multiple image".

There is a well-known story presenting the fundamental ideas of zero-knowledge proofs, first published in 1990 by Jean-Jacques Quisquater and others in their paper "How to Explain Zero-Knowledge Protocols to Your Children".[9] The two parties in the zero-knowledge proof story are Peggy as the prover of the statement, and Victor, the verifier of the statement.

In this story, Peggy has uncovered the secret word used to open a magic door in a cave. The cave is shaped like a ring, with the entrance on one side and the magic door blocking the opposite side. Victor wants to know whether Peggy knows the secret word; but Peggy, being a very private person, does not want to reveal her knowledge (the secret word) to Victor or to reveal the fact of her knowledge to the world in general.

They label the left and right paths from the entrance A and B. First, Victor waits outside the cave as Peggy goes in. Peggy takes either path A or B; Victor is not allowed to see which path she takes. Then, Victor enters the cave and shouts the name of the path he wants her to use to return, either A or B, chosen at random. Providing she really does know the magic word, this is easy: she opens the door, if necessary, and returns along the desired path.

However, suppose she did not know the word. Then, she would only be able to return by the named path if Victor were to give the name of the same path by which she had entered. Since Victor would choose A or B at random, she would have a 50% chance of guessing correctly. If they were to repeat this trick many times, say 20 times in a row, her chance of successfully anticipating all of Victor's requests would be reduced to 1 in 220, or 9.54Template:Times10−7.

Thus, if Peggy repeatedly appears at the exit Victor names, then he can conclude that it is extremely probable that Peggy does, in fact, know the secret word.

One side note with respect to third-party observers: even if Victor is wearing a hidden camera that records the whole transaction, the only thing the camera will record is in one case Victor shouting "A!" and Peggy appearing at A or in the other case Victor shouting "B!" and Peggy appearing at B. A recording of this type would be trivial for any two people to fake (requiring only that Peggy and Victor agree beforehand on the sequence of As and Bs that Victor will shout). Such a recording will certainly never be convincing to anyone but the original participants. In fact, even a person who was present as an observer at the original experiment should be unconvinced, since Victor and Peggy could have orchestrated the whole "experiment" from start to finish.

Further, if Victor chooses his As and Bs by flipping a coin on-camera, this protocol loses its zero-knowledge property; the on-camera coin flip would probably be convincing to any person watching the recording later. Thus, although this does not reveal the secret word to Victor, it does make it possible for Victor to convince the world in general that Peggy has that knowledge—counter to Peggy's stated wishes. However, digital cryptography generally "flips coins" by relying on a pseudo-random number generator, which is akin to a coin with a fixed pattern of heads and tails known only to the coin's owner. If Victor's coin behaved this way, then again it would be possible for Victor and Peggy to have faked the experiment, so using a pseudo-random number generator would not reveal Peggy's knowledge to the world in the same way that using a flipped coin would.

Peggy could prove to Victor that she knows the magic word, without revealing it to him, in a single trial. If both Victor and Peggy go together to the mouth of the cave, Victor can watch Peggy go in through A and come out through B. This would prove with certainty that Peggy knows the magic word, without revealing the magic word to Victor. However, such a proof could be observed by a third party, or recorded by Victor and such a proof would be convincing to anybody. In other words, Peggy could not refute such proof by claiming she colluded with Victor, and she is therefore no longer in control of who is aware of her knowledge.

Two balls and the colour-blind friend

Imagine Victor is red-green colour-blind (while Peggy is not) and Peggy has two balls: one red and one green, but otherwise identical. To Victor, the balls seem completely identical. Victor is skeptical that the balls are actually distinguishable. Peggy wants to prove to Victor that the balls are in fact differently coloured, but nothing else. In particular, Peggy does not want to reveal which ball is the red one and which is the green.

Here is the proof system: Peggy gives the two balls to Victor and he puts them behind his back. Next, he takes one of the balls and brings it out from behind his back and displays it. He then places it behind his back again and then chooses to reveal just one of the two balls, picking one of the two at random with equal probability. He will ask Peggy, "Did I switch the ball?" This whole procedure is then repeated as often as necessary.

By looking at the balls' colours, Peggy can, of course, say with certainty whether or not he switched them. On the other hand, if the balls were the same colour and hence indistinguishable, Peggy's ability to determine whether a switch occurred would be no better than random guessing. Since the probability that Peggy would have randomly succeeded at identifying each switch/non-switch is 50%, the probability of having randomly succeeded at all switch/non-switches approaches zero.

Over multiple trials, the success rate would statistically converge to 50%, and Peggy could not achieve a performance significantly better than chance. If Peggy and Victor repeat this "proof" multiple times (e.g. 20 times), Victor should become convinced that the balls are indeed differently coloured.

The above proof is zero-knowledge because Victor never learns which ball is green and which is red; indeed, he gains no knowledge about how to distinguish the balls.[10]

Definition

Script error: No such module "Unsubst". A zero-knowledge proof of some statement must satisfy three properties:

  1. Completeness: if the statement is true, then an honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover.
  2. Soundness: if the statement is false, then no cheating prover can convince an honest verifier that it is true, except with some small probability.
  3. Zero-knowledge: if the statement is true, then no verifier learns anything other than the fact that the statement is true. In other words, just knowing the statement (not the secret) is sufficient to imagine a scenario showing that the prover knows the secret. This is formalized by showing that every verifier has some simulator that, given only the statement to be proved (and no access to the prover), can produce a transcript that "looks like" an interaction between an honest prover and the verifier in question.

The first two of these are properties of more general interactive proof systems. The third is what makes the proof zero-knowledge.[11]

Zero-knowledge proofs are not proofs in the mathematical sense of the term because there is some small probability, the soundness error, that a cheating prover will be able to convince the verifier of a false statement. In other words, zero-knowledge proofs are probabilistic "proofs" rather than deterministic proofs. However, there are techniques to decrease the soundness error to negligibly small values (for example, guessing correctly on a hundred or thousand binary decisions has a 1/2100 or 1/21000 soundness error, respectively. As the number of bits increases, the soundness error decreases toward zero).

A formal definition of zero-knowledge must use some computational model, the most common one being that of a Turing machine. Let Template:Mvar, Template:Mvar, and Template:Mvar be Turing machines. An interactive proof system with Template:Mvar for a language Template:Mvar is zero-knowledge if for any probabilistic polynomial time (PPT) verifier V^ there exists a PPT simulator Template:Mvar such that:

xL,z{0,1}*,ViewV^[P(x)V^(x,z)]=S(x,z),

where ViewV^[P(x)↔V^(x,z)]Script error: No such module "Check for unknown parameters". is a record of the interactions between P(x)Script error: No such module "Check for unknown parameters". and V(x,z)Script error: No such module "Check for unknown parameters".. The prover Template:Mvar is modeled as having unlimited computation power (in practice, Template:Mvar usually is a probabilistic Turing machine). Intuitively, the definition states that an interactive proof system (P,V)Script error: No such module "Check for unknown parameters". is zero-knowledge if for any verifier V^ there exists an efficient simulator Template:Mvar (depending on V^) that can reproduce the conversation between Template:Mvar and V^ on any given input. The auxiliary string Template:Mvar in the definition plays the role of "prior knowledge" (including the random coins of V^). The definition implies that V^ cannot use any prior knowledge string Template:Mvar to mine information out of its conversation with Template:Mvar, because if Template:Mvar is also given this prior knowledge then it can reproduce the conversation between V^ and Template:Mvar just as before. Script error: No such module "Unsubst".

The definition given is that of perfect zero-knowledge. Computational zero-knowledge is obtained by requiring that the views of the verifier V^ and the simulator are only computationally indistinguishable, given the auxiliary string.[12]

Practical examples

Discrete log of a given value

These ideas can be applied to a more realistic cryptography application. Peggy wants to prove to Victor that she knows the discrete logarithm of a given value in a given group.[13]

For example, given a value Template:Mvar, a large prime Template:Mvar, and a generator g, she wants to prove that she knows a value Template:Mvar such that gxy (mod p)Script error: No such module "Check for unknown parameters"., without revealing Template:Mvar. Indeed, knowledge of Template:Mvar could be used as a proof of identity, in that Peggy could have such knowledge because she chose a random value Template:Mvar that she did not reveal to anyone, computed y = gx mod pScript error: No such module "Check for unknown parameters"., and distributed the value of Template:Mvar to all potential verifiers, such that at a later time, proving knowledge of Template:Mvar is equivalent to proving identity as Peggy.

The protocol proceeds as follows: in each round, Peggy generates a random number Template:Mvar, computes C = gr mod pScript error: No such module "Check for unknown parameters". and discloses this to Victor. After receiving Template:Mvar, Victor randomly issues one of the following two requests: he either requests that Peggy discloses the value of Template:Mvar, or the value of (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"..

Victor can verify either answer; if he requested Template:Mvar, he can then compute gr mod pScript error: No such module "Check for unknown parameters". and verify that it matches Template:Mvar. If he requested (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"., then he can verify that Template:Mvar is consistent with this, by computing g(x + r) mod (p − 1) mod pScript error: No such module "Check for unknown parameters". and verifying that it matches (C · y) mod pScript error: No such module "Check for unknown parameters".. If Peggy indeed knows the value of Template:Mvar, then she can respond to either one of Victor's possible challenges.

If Peggy knew or could guess which challenge Victor is going to issue, then she could easily cheat and convince Victor that she knows Template:Mvar when she does not: if she knows that Victor is going to request Template:Mvar, then she proceeds normally: she picks Template:Mvar, computes C = gr mod pScript error: No such module "Check for unknown parameters"., and discloses Template:Mvar to Victor; she will be able to respond to Victor's challenge. On the other hand, if she knows that Victor will request (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"., then she picks a random value rScript error: No such module "Check for unknown parameters"., computes C′ ≡ gr · (gx)−1 mod pScript error: No such module "Check for unknown parameters"., and discloses CScript error: No such module "Check for unknown parameters". to Victor as the value of Template:Mvar that he is expecting. When Victor challenges her to reveal (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"., she reveals rScript error: No such module "Check for unknown parameters"., for which Victor will verify consistency, since he will in turn compute gr mod pScript error: No such module "Check for unknown parameters"., which matches C′ · yScript error: No such module "Check for unknown parameters"., since Peggy multiplied by the modular multiplicative inverse of Template:Mvar.

However, if in either one of the above scenarios Victor issues a challenge other than the one she was expecting and for which she manufactured the result, then she will be unable to respond to the challenge under the assumption of infeasibility of solving the discrete log for this group. If she picked Template:Mvar and disclosed C = gr mod pScript error: No such module "Check for unknown parameters"., then she will be unable to produce a valid (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters". that would pass Victor's verification, given that she does not know Template:Mvar. And if she picked a value rScript error: No such module "Check for unknown parameters". that poses as (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"., then she would have to respond with the discrete log of the value that she disclosedTemplate:Snd but Peggy does not know this discrete log, since the value Template:Mvar she disclosed was obtained through arithmetic with known values, and not by computing a power with a known exponent.

Thus, a cheating prover has a 0.5 probability of successfully cheating in one round. By executing a large-enough number of rounds, the probability of a cheating prover succeeding can be made arbitrarily low.

To show that the above interactive proof gives zero knowledge other than the fact that Peggy knows Template:Mvar, one can use similar arguments as used in the above proof of completeness and soundness. Specifically, a simulator, say Simon, who does not know Template:Mvar, can simulate the exchange between Peggy and Victor by the following procedure. Firstly, Simon randomly flips a fair coin. If the result is "heads", then he picks a random value Template:Mvar, computes C = gr mod pScript error: No such module "Check for unknown parameters"., and discloses Template:Mvar as if it is a message from Peggy to Victor. Then Simon also outputs a message "request the value of Template:Mvar" as if it is sent from Victor to Peggy, and immediately outputs the value of Template:Mvar as if it is sent from Peggy to Victor. A single round is complete. On the other hand, if the coin flipping result is "tails", then Simon picks a random number rScript error: No such module "Check for unknown parameters"., computes C′ = gr · y−1 mod pScript error: No such module "Check for unknown parameters"., and discloses CScript error: No such module "Check for unknown parameters". as if it is a message from Peggy to Victor. Then Simon outputs "request the value of (x + r) mod (p − 1)Script error: No such module "Check for unknown parameters"." as if it is a message from Victor to Peggy. Finally, Simon outputs the value of rScript error: No such module "Check for unknown parameters". as if it is the response from Peggy back to Victor. A single round is complete. By the previous arguments when proving the completeness and soundness, the interactive communication simulated by Simon is indistinguishable from the true correspondence between Peggy and Victor. The zero-knowledge property is thus guaranteed.

Hamiltonian cycle for a large graph

The following scheme is due to Manuel Blum.[14]

In this scenario, Peggy knows a Hamiltonian cycle for a large graph Template:Mvar. Victor knows Template:Mvar but not the cycle (e.g., Peggy has generated Template:Mvar and revealed it to him.) Finding a Hamiltonian cycle given a large graph is believed to be computationally infeasible, since its corresponding decision version is known to be NP-complete. Peggy will prove that she knows the cycle without simply revealing it (perhaps Victor is interested in buying it but wants verification first, or maybe Peggy is the only one who knows this information and is proving her identity to Victor).

To show that Peggy knows this Hamiltonian cycle, she and Victor play several rounds of a game:

  • At the beginning of each round, Peggy creates Template:Mvar, a graph which is isomorphic to Template:Mvar (that is, Template:Mvar is just like Template:Mvar except that all the vertices have different names). Since it is trivial to translate a Hamiltonian cycle between isomorphic graphs with known isomorphism, if Peggy knows a Hamiltonian cycle for Template:Mvar then she also must know one for Template:Mvar.
  • Peggy commits to Template:Mvar. She could do so by using a cryptographic commitment scheme. Alternatively, she could number the vertices of Template:Mvar. Next, for each edge of Template:Mvar, on a small piece of paper, she writes down the two vertices that the edge joins. Then she puts all these pieces of paper face down on a table. The purpose of this commitment is that Peggy is not able to change Template:Mvar while, at the same time, Victor has no information about Template:Mvar.
  • Victor then randomly chooses one of two questions to ask Peggy. He can either ask her to show the isomorphism between Template:Mvar and Template:Mvar (see graph isomorphism problem), or he can ask her to show a Hamiltonian cycle in Template:Mvar.
  • If Peggy is asked to show that the two graphs are isomorphic, then she first uncovers all of Template:Mvar (e.g. by turning over all pieces of papers that she put on the table) and then provides the vertex translations that map Template:Mvar to Template:Mvar. Victor can verify that they are indeed isomorphic.
  • If Peggy is asked to prove that she knows a Hamiltonian cycle in Template:Mvar, then she translates her Hamiltonian cycle in Template:Mvar onto Template:Mvar and only uncovers the edges on the Hamiltonian cycle. That is, Peggy only turns over exactly Template:AbsScript error: No such module "Check for unknown parameters". of the pieces of paper that correspond to the edges of the Hamiltonian cycle, while leaving the rest still face-down. This is enough for Victor to check that Template:Mvar does indeed contain a Hamiltonian cycle.

It is important that the commitment to the graph be such that Victor can verify, in the second case, that the cycle is really made of edges from Template:Mvar. This can be done by, for example, committing to every edge (or lack thereof) separately.

Completeness

If Peggy does know a Hamiltonian cycle in Template:Mvar, then she can easily satisfy Victor's demand for either the graph isomorphism producing Template:Mvar from Template:Mvar (which she had committed to in the first step) or a Hamiltonian cycle in Template:Mvar (which she can construct by applying the isomorphism to the cycle in Template:Mvar).

Zero-knowledge

Peggy's answers do not reveal the original Hamiltonian cycle in Template:Mvar. In each round, Victor will learn only Template:Mvar's isomorphism to Template:Mvar or a Hamiltonian cycle in Template:Mvar. He would need both answers for a single Template:Mvar to discover the cycle in Template:Mvar, so the information remains unknown as long as Peggy can generate a distinct Template:Mvar every round. If Peggy does not know of a Hamiltonian cycle in Template:Mvar, but somehow knew in advance what Victor would ask to see each round, then she could cheat. For example, if Peggy knew ahead of time that Victor would ask to see the Hamiltonian cycle in Template:Mvar, then she could generate a Hamiltonian cycle for an unrelated graph. Similarly, if Peggy knew in advance that Victor would ask to see the isomorphism then she could simply generate an isomorphic graph Template:Mvar (in which she also does not know a Hamiltonian cycle). Victor could simulate the protocol by himself (without Peggy) because he knows what he will ask to see. Therefore, Victor gains no information about the Hamiltonian cycle in Template:Mvar from the information revealed in each round.

Soundness

If Peggy does not know the information, then she can guess which question Victor will ask and generate either a graph isomorphic to Template:Mvar or a Hamiltonian cycle for an unrelated graph, but since she does not know a Hamiltonian cycle for Template:Mvar, she cannot do both. With this guesswork, her chance of fooling Victor is 2nScript error: No such module "Check for unknown parameters"., where Template:Mvar is the number of rounds. For all realistic purposes, it is infeasibly difficult to defeat a zero-knowledge proof with a reasonable number of rounds in this way.

Variants of zero-knowledge

Different variants of zero-knowledge can be defined by formalizing the intuitive concept of what is meant by the output of the simulator "looking like" the execution of the real proof protocol in the following ways:

  • We speak of perfect zero-knowledge if the distributions produced by the simulator and the proof protocol are distributed exactly the same. This is for instance the case in the first example above.
  • Statistical zero-knowledge[15] means that the distributions are not necessarily exactly the same, but they are statistically close, meaning that their statistical difference is a negligible function.
  • We speak of computational zero-knowledge if no efficient algorithm can distinguish the two distributions.

Zero knowledge types

There are various types of zero-knowledge proofs:

Zero-knowledge proof schemes can be constructed from various cryptographic primitives, such as hash-based cryptography, pairing-based cryptography, multi-party computation, or lattice-based cryptography.

Applications

Authentication systems

Research in zero-knowledge proofs has been motivated by authentication systems where one party wants to prove its identity to a second party via some secret information (such as a password) but does not want the second party to learn anything about this secret. This is called a "zero-knowledge proof of knowledge". However, a password is typically too small or insufficiently random to be used in many schemes for zero-knowledge proofs of knowledge. A zero-knowledge password proof is a special kind of zero-knowledge proof of knowledge that addresses the limited size of passwords.Script error: No such module "Unsubst".

In April 2015, the one-out-of-many proofs protocol (a Sigma protocol) was introduced.[16] In August 2021, Cloudflare, an American web infrastructure and security company, decided to use the one-out-of-many proofs mechanism for private web verification using vendor hardware.[17]

Ethical behavior

One of the uses of zero-knowledge proofs within cryptographic protocols is to enforce honest behavior while maintaining privacy. Roughly, the idea is to force a user to prove, using a zero-knowledge proof, that its behavior is correct according to the protocol.[1][18] Because of soundness, we know that the user must really act honestly in order to be able to provide a valid proof. Because of zero knowledge, we know that the user does not compromise the privacy of its secrets in the process of providing the proof.Script error: No such module "Unsubst".

Nuclear disarmament

In 2016, the Princeton Plasma Physics Laboratory and Princeton University demonstrated a technique that may have applicability to future nuclear disarmament talks. It would allow inspectors to confirm whether or not an object is indeed a nuclear weapon without recording, sharing, or revealing the internal workings, which might be secret.[19]

Blockchains

Zero-knowledge proofs were applied in the Zerocoin and Zerocash protocols, which culminated in the birth of Zcoin[20] (later rebranded as Firo in 2020)[21] and Zcash cryptocurrencies in 2016. Zerocoin has a built-in mixing model that does not trust any peers or centralised mixing providers to ensure anonymity.[20] Users can transact in a base currency and can cycle the currency into and out of Zerocoins.[22] The Zerocash protocol uses a similar model (a variant known as a non-interactive zero-knowledge proof)[23] except that it can obscure the transaction amount, while Zerocoin cannot. Given significant restrictions of transaction data on the Zerocash network, Zerocash is less prone to privacy timing attacks when compared to Zerocoin. However, this additional layer of privacy can cause potentially undetected hyperinflation of Zerocash supply because fraudulent coins cannot be tracked.[20][24]

In 2018, Bulletproofs were introduced. Bulletproofs are an improvement from non-interactive zero-knowledge proofs where a trusted setup is not needed.[25] It was later implemented into the Mimblewimble protocol (which the Grin and Beam cryptocurrencies are based upon) and Monero cryptocurrency.[26] In 2019, Firo implemented the Sigma protocol, which is an improvement on the Zerocoin protocol without trusted setup.[27][16] In the same year, Firo introduced the Lelantus protocol, an improvement on the Sigma protocol, where the former hides the origin and amount of a transaction.[28]

A related line of work applies zero-knowledge proofs to database analytics via so-called zero-knowledge "coprocessors": off-chain systems that execute queries and return both the result and a proof that the computation was performed correctly on untampered data. Academic prototypes have shown how to produce ZK proofs for ad-hoc SQL queries while hiding inputs and guaranteeing correctness of the result (e.g., ZKSQL).[29] One implementation of this approach, termed "Proof of SQL", has been reported in industry media as enabling sub-second ZK proving for SQL query results and making the prover available as open source.[30][31] Earlier coverage also described the concept under development as a cryptographic protocol allowing decentralized applications to verify that SQL results have not been tampered with.[32][33]

Decentralized Identifiers

Zero-knowledge proofs by their nature can enhance privacy in identity-sharing systems, which are vulnerable to data breaches and identity theft. When integrated to a decentralized identifier system, ZKPs add an extra layer of encryption on DID documents.[34]

History

Zero-knowledge proofs were first conceived in 1985 by Shafi Goldwasser, Silvio Micali, and Charles Rackoff in their paper "The Knowledge Complexity of Interactive Proof-Systems".[1] This paper introduced the IP hierarchy of interactive proof systems (see interactive proof system) and conceived the concept of knowledge complexity, a measurement of the amount of knowledge about the proof transferred from the prover to the verifier. They also gave the first zero-knowledge proof for a concrete problem, that of deciding quadratic nonresidues mod m. Together with a paper by László Babai and Shlomo Moran, this landmark paper invented interactive proof systems, for which all five authors won the first Gödel Prize in 1993.

In their own words, Goldwasser, Micali, and Rackoff say:

Of particular interest is the case where this additional knowledge is essentially 0 and we show that [it] is possible to interactively prove that a number is quadratic non residue mod m releasing 0 additional knowledge. This is surprising as no efficient algorithm for deciding quadratic residuosity mod m is known when m's factorization is not given. Moreover, all known NP proofs for this problem exhibit the prime factorization of m. This indicates that adding interaction to the proving process, may decrease the amount of knowledge that must be communicated in order to prove a theorem.

The quadratic nonresidue problem has both an NP and a co-NP algorithm, and so lies in the intersection of NP and co-NP. This was also true of several other problems for which zero-knowledge proofs were subsequently discovered, such as an unpublished proof system by Oded Goldreich verifying that a two-prime modulus is not a Blum integer.[35]

Oded Goldreich, Silvio Micali, and Avi Wigderson took this one step further, showing that, assuming the existence of unbreakable encryption, one can create a zero-knowledge proof system for the NP-complete graph coloring problem with three colors. Since every problem in NP can be efficiently reduced to this problem, this means that, under this assumption, all problems in NP have zero-knowledge proofs.[36] The reason for the assumption is that, as in the above example, their protocols require encryption. A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of one-way functions, but it is conceivable that some physical means might also achieve it.

On top of this, they also showed that the graph nonisomorphism problem, the complement of the graph isomorphism problem, has a zero-knowledge proof. This problem is in co-NP, but is not currently known to be in either NP or any practical class. More generally, Russell Impagliazzo and Moti Yung as well as Ben-Or et al. would go on to show that, also assuming one-way functions or unbreakable encryption, there are zero-knowledge proofs for all problems in IP = PSPACE, or in other words, anything that can be proved by an interactive proof system can be proved with zero knowledge.[37][38]

Not liking to make unnecessary assumptions, many theorists sought a way to eliminate the necessity of one way functions. One way this was done was with multi-prover interactive proof systems (see interactive proof system), which have multiple independent provers instead of only one, allowing the verifier to "cross-examine" the provers in isolation to avoid being misled. It can be shown that, without any intractability assumptions, all languages in NP have zero-knowledge proofs in such a system.[39]

It turns out that, in an Internet-like setting, where multiple protocols may be executed concurrently, building zero-knowledge proofs is more challenging. The line of research investigating concurrent zero-knowledge proofs was initiated by the work of Dwork, Naor, and Sahai.[40] One particular development along these lines has been the development of witness-indistinguishable proof protocols. The property of witness-indistinguishability is related to that of zero-knowledge, yet witness-indistinguishable protocols do not suffer from the same problems of concurrent execution.[41]

Another variant of zero-knowledge proofs are non-interactive zero-knowledge proofs. Blum, Feldman, and Micali showed that a common random string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction.[5][6]

Zero-Knowledge Proof protocols

The most popular interactive or non-interactive zero-knowledge proof (e.g., zk-SNARK) protocols can be broadly categorized in the following four categories: Succinct Non-Interactive ARguments of Knowledge (SNARK), Scalable Transparent ARgument of Knowledge (STARK), Verifiable Polynomial Delegation (VPD), and Succinct Non-interactive ARGuments (SNARG). A list of zero-knowledge proof protocols and libraries is provided below along with comparisons based on transparency, universality, plausible post-quantum security, and programming paradigm.[42] A transparent protocol is one that does not require any trusted setup and uses public randomness. A universal protocol is one that does not require a separate trusted setup for each circuit. Finally, a plausibly post-quantum protocol is one that is not susceptible to known attacks involving quantum algorithms.

Zero-knowledge proof (ZKP) systems
ZKP System Publication year Protocol Transparent Universal Plausibly Post-Quantum Secure Programming Paradigm
Pinocchio[43] 2013 zk-SNARK No No No Procedural
Geppetto[44] 2015 zk-SNARK No No No Procedural
TinyRAM[45] 2013 zk-SNARK No No No Procedural
Buffet[46] 2015 zk-SNARK No No No Procedural
ZoKrates[47] 2018 zk-SNARK No No No Procedural
xJsnark[48] 2018 zk-SNARK No No No Procedural
vRAM[49] 2018 zk-SNARG No Yes No Assembly
vnTinyRAM[50] 2014 zk-SNARK No Yes No Procedural
MIRAGE[51] 2020 zk-SNARK No Yes No Arithmetic Circuits
Sonic[52] 2019 zk-SNARK No Yes No Arithmetic Circuits
Marlin[53] 2020 zk-SNARK No Yes No Arithmetic Circuits
PLONK[54] 2019 zk-SNARK No Yes No Arithmetic Circuits
SuperSonic[55] 2020 zk-SNARK Yes Yes No Arithmetic Circuits
Bulletproofs[25] 2018 Bulletproofs Yes Yes No Arithmetic Circuits
Hyrax[56] 2018 zk-SNARK Yes Yes No Arithmetic Circuits
Halo[57] 2019 zk-SNARK Yes Yes No Arithmetic Circuits
Virgo[58] 2020 zk-SNARK Yes Yes Yes Arithmetic Circuits
Ligero[59] 2017 zk-SNARK Yes Yes Yes Arithmetic Circuits
Aurora[60] 2019 zk-SNARK Yes Yes Yes Arithmetic Circuits
zk-STARK[61] 2019 zk-STARK Yes Yes Yes Assembly
Zilch[42] 2021 zk-STARK Yes Yes Yes Object-Oriented
Hyperbridge[62] 2024 zk-SNARK Yes Yes Yes Arithmetic Circuits

Security vulnerabilities of zero-knowledge systems

While zero-knowledge proofs offer a secure way to verify information, the arithmetic circuits that implement them must be carefully designed. If these circuits lack sufficient constraints, they may introduce subtle yet critical security vulnerabilities.

One of the most common classes of vulnerabilities in these systems is under-constrained logic, where insufficient constraints allow a malicious prover to produce a proof for an incorrect statement that still passes verification. A 2024 systematization of known attacks found that approximately 96% of documented circuit-layer bugs in SNARK-based systems were due to under-constrained circuits.[63]

These vulnerabilities often arise during the translation of high-level logic into low-level constraint systems, particularly when using domain-specific languages such as Circom or Gnark. Recent research has demonstrated that formally proving determinism – ensuring that a circuit's outputs are uniquely determined by its inputs – can eliminate entire classes of these vulnerabilities.[64]

See also

<templatestyles src="Div col/styles.css"/>

External links

References

<templatestyles src="Reflist/styles.css" />

  1. a b c Script error: No such module "citation/CS1".
  2. Script error: No such module "citation/CS1".
  3. Script error: No such module "citation/CS1".
  4. Script error: No such module "citation/CS1".
  5. a b Script error: No such module "citation/CS1".
  6. a b Script error: No such module "Citation/CS1".
  7. Script error: No such module "citation/CS1".
  8. a b c Script error: No such module "citation/CS1".
  9. Script error: No such module "citation/CS1".
  10. Script error: No such module "citation/CS1".
  11. Script error: No such module "Citation/CS1".
  12. Script error: No such module "citation/CS1".
  13. Script error: No such module "citation/CS1".
  14. Script error: No such module "Citation/CS1".
  15. Script error: No such module "Citation/CS1".
  16. a b Script error: No such module "citation/CS1".
  17. Script error: No such module "citation/CS1".
  18. Script error: No such module "citation/CS1".
  19. Script error: No such module "citation/CS1".
  20. a b c Script error: No such module "citation/CS1".
  21. Script error: No such module "citation/CS1".
  22. Script error: No such module "citation/CS1".
  23. Script error: No such module "citation/CS1".
  24. Script error: No such module "citation/CS1".
  25. a b Script error: No such module "citation/CS1".
  26. Script error: No such module "citation/CS1".
  27. Script error: No such module "citation/CS1".
  28. Script error: No such module "Citation/CS1".
  29. Script error: No such module "Citation/CS1".
  30. Script error: No such module "citation/CS1".
  31. Script error: No such module "citation/CS1".
  32. Script error: No such module "citation/CS1".
  33. Script error: No such module "citation/CS1".
  34. Script error: No such module "Citation/CS1".
  35. Script error: No such module "Citation/CS1".
  36. Script error: No such module "Citation/CS1".
  37. Russell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40–51
  38. Script error: No such module "citation/CS1".
  39. Script error: No such module "citation/CS1".
  40. Script error: No such module "Citation/CS1".
  41. Script error: No such module "citation/CS1".
  42. a b Script error: No such module "Citation/CS1".
  43. Script error: No such module "citation/CS1".
  44. Script error: No such module "citation/CS1".
  45. Script error: No such module "citation/CS1".
  46. Script error: No such module "Citation/CS1".
  47. Script error: No such module "citation/CS1".
  48. Script error: No such module "citation/CS1".
  49. Script error: No such module "citation/CS1".
  50. Script error: No such module "Citation/CS1".
  51. Script error: No such module "Citation/CS1".
  52. Script error: No such module "citation/CS1".
  53. Script error: No such module "citation/CS1".
  54. Script error: No such module "Citation/CS1".
  55. Script error: No such module "citation/CS1".
  56. Script error: No such module "citation/CS1".
  57. Script error: No such module "Citation/CS1".
  58. Script error: No such module "citation/CS1".
  59. Script error: No such module "citation/CS1".
  60. Script error: No such module "citation/CS1".
  61. Script error: No such module "citation/CS1".
  62. Script error: No such module "citation/CS1".
  63. Script error: No such module "citation/CS1".
  64. Script error: No such module "Citation/CS1".

Script error: No such module "Check for unknown parameters".