Real-world Universal zkSNARKs are non-malleable

Faonio, Antonio; Fiore, Dario; Russo, Luigi
CCS 2024, 31st ACM Conference on Computer and Communications Security, 14-18 October 2024, Salt Lake City, USA

Simulation extractability is a strong security notion of zkSNARKs that guarantees that an attacker who produces a valid proof must know the corresponding witness, even if the attacker had prior access to proofs generated by other users. Notably, simulation extractability implies that proofs are non-malleable and is of fundamental importance for applications of zkSNARKs in distributed systems. In this work, we study sufficient and necessary conditions for constructing simulation-extractable universal zkSNARKs via the popular design approach based on compiling polynomial interactive oracle proofs (PIOP). Our main result is the first security proof that popular universal zkSNARKs, such as PLONK and Marlin, as deployed in the real world, are simulation-extractable. Our result fills a gap left from previous work (Faonio et al. TCC’23, and Kohlweiss et al. TCC’23) which could only prove the simulation extractability of the “textbook” versions of these schemes and does not capture their optimized variants, with all the popular optimization tricks in place, that are eventually implemented and deployed in software libraries.


DOI
HAL
Type:
Conference
City:
Salt Lake City
Date:
2024-10-14
Department:
Digital Security
Eurecom Ref:
7854
Copyright:
© ACM, 2024. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS 2024, 31st ACM Conference on Computer and Communications Security, 14-18 October 2024, Salt Lake City, USA https://doi.org/10.1145/3658644.3690351

PERMALINK : https://www.eurecom.fr/publication/7854