TY - GEN
T1 - Verifiable Capacity-Bound Functions
T2 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2023
AU - Ateniese, Giuseppe
AU - Chen, Long
AU - Francati, Danilo
AU - Papadopoulos, Dimitrios
AU - Tang, Qiang
N1 - Publisher Copyright:
© 2023, International Association for Cryptologic Research.
PY - 2023
Y1 - 2023
N2 - We initiate the study of verifiable capacity-bound function (VCBF). The main VCBF property imposes a strict lower bound on the number of bits read from memory during evaluation (referred to as minimum capacity). No adversary, even with unbounded computational resources, should produce an output without spending this minimum memory capacity. Moreover, a VCBF allows for an efficient public verification process: Given a proof of correctness, checking the validity of the output takes significantly fewer memory resources, sublinear in the target minimum capacity. Finally, it achieves soundness, i.e., no computationally bounded adversary can produce a proof that passes verification for a false output. With these properties, we believe a VCBF can be viewed as a “space” analog of a verifiable delay function. We then propose the first VCBF construction relying on evaluating a degree- d polynomial f from Fp[ x] at a random point. We leverage ideas from Kolmogorov complexity to prove that sampling f from a large set (i.e., for high-enough d) ensures that evaluation must entail reading a number of bits proportional to the size of its coefficients. Moreover, our construction benefits from existing verifiable polynomial evaluation schemes to realize our efficient verification requirements. In practice, for a field of order O(2 λ) our VCBF achieves O((d+ 1 ) λ) minimum capacity, whereas verification requires just O(λ). The minimum capacity of our VCBF construction holds against adversaries that perform a constant number of random memory accesses during evaluation. This poses the natural question of whether a VCBF with high minimum capacity guarantees exists when dealing with adversaries that perform non-constant (e.g., polynomial) number of random accesses.
AB - We initiate the study of verifiable capacity-bound function (VCBF). The main VCBF property imposes a strict lower bound on the number of bits read from memory during evaluation (referred to as minimum capacity). No adversary, even with unbounded computational resources, should produce an output without spending this minimum memory capacity. Moreover, a VCBF allows for an efficient public verification process: Given a proof of correctness, checking the validity of the output takes significantly fewer memory resources, sublinear in the target minimum capacity. Finally, it achieves soundness, i.e., no computationally bounded adversary can produce a proof that passes verification for a false output. With these properties, we believe a VCBF can be viewed as a “space” analog of a verifiable delay function. We then propose the first VCBF construction relying on evaluating a degree- d polynomial f from Fp[ x] at a random point. We leverage ideas from Kolmogorov complexity to prove that sampling f from a large set (i.e., for high-enough d) ensures that evaluation must entail reading a number of bits proportional to the size of its coefficients. Moreover, our construction benefits from existing verifiable polynomial evaluation schemes to realize our efficient verification requirements. In practice, for a field of order O(2 λ) our VCBF achieves O((d+ 1 ) λ) minimum capacity, whereas verification requires just O(λ). The minimum capacity of our VCBF construction holds against adversaries that perform a constant number of random memory accesses during evaluation. This poses the natural question of whether a VCBF with high minimum capacity guarantees exists when dealing with adversaries that perform non-constant (e.g., polynomial) number of random accesses.
KW - Adaptive security
KW - Kolmogorov complexity
KW - Polynomial evaluation
KW - Verifiable computation
KW - Verifiable delay function
UR - http://www.scopus.com/inward/record.url?scp=85161623395&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85161623395&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-31371-4_3
DO - 10.1007/978-3-031-31371-4_3
M3 - Conference contribution
AN - SCOPUS:85161623395
SN - 9783031313707
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 63
EP - 93
BT - Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
A2 - Boldyreva, Alexandra
A2 - Kolesnikov, Vladimir
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 7 May 2023 through 10 May 2023
ER -