On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

61 Downloads (Pure)

Abstract

ZK-SNARKs, a fundamental component of privacyoriented payment systems, identity protocols, or anonymous voting systems, are advanced cryptographic protocols for verifiable computation: modern SNARKs allow to encode the invariants of a program, expressed as an arithmetic circuit, in an appropriate constraint language from which short, zero-knowledge proofs for correct computations can be constructed. One of the most important computations that is run through SNARK systems is the verification of Merkle tree (MT) opening proofs, which relies on the evaluation of a fixed-input-length (FIL) cryptographic compression function over binary MTs. As classical, bit-oriented hash functions like SHA-2 are not compactly representable in SNARK frameworks, Arithmetization-Oriented (AO) cryptographic designs have emerged as an alternative, efficient solution. Today, the majority of AO compression functions are constructed from permutation-based hashing modes, such as Sponge. While this approach allows cost savings, compared to blockcipher-based modes, as it does not require key-scheduling, AO blockcipher schedulers are often cheap to compute. Furthermore, classical bit-oriented cryptography has long studied how to construct provably secure compression functions from blockciphers, following the Preneel-Govaerts-Vandewalle (PGV) framework. The potential efficiency gains together with the strong provable security foundations in the classic setting, motivate the study of AO blockcipher-based compression functions. In this work, we propose AO PGV-LC and PGV-ELC, two AO blockcipher-based FIL compression modes inspired by and extending the classical PGV approach, offering parametrizable input and output sizes and coming with provable security guarantees in the AO setting. We prove the collision and preimage resistance in the ideal cipher model, and give bounds for collision and opening resistance over MTs of arbitrary arity. We compare experimentally the AO PGV-ELC mode over the HADES blockcipher with its popular and widely adopted Sponge instantation, POSEIDON, and its improved variant POSEIDON2. Our resulting constructions are up to 3× faster than POSEIDON and 2× faster than POSEIDON2 in native x86 execution, and up to 50% faster in the Groth16 SNARK framework. Finally, we study the benefits of using MTs of arity wider than two, proposing a new strategy to obtain a compact R1CS constraint system in such case. In fact, by combining an efficient parametrization of the HADES blockcipher over the PGV-ELC mode, together with an optimal choice of the MT arity, we measuerd an improvement of up to 9× in native MT construction time, and up to 2.5× in proof generation time, compared to POSEIDON over binary MTs.
Original languageEnglish
Title of host publication2024 IEEE 37th Computer Security Foundations Symposium (CSF)
PublisherIEEE
Pages558-573
Number of pages16
ISBN (Electronic)979-8-3503-6203-9
DOIs
Publication statusAccepted/In press - 8 Apr 2024
Event37th IEEE Computer Security Foundations Symposium - Enschede, Netherlands
Duration: 8 Jul 202412 Jul 2024

Publication series

NameIEEE Computer Security Foundations Symposium
PublisherIEEE
ISSN (Print)1940-1434
ISSN (Electronic)2374-8303

Conference

Conference37th IEEE Computer Security Foundations Symposium
Abbreviated titleCSF 2024
Country/TerritoryNetherlands
CityEnschede
Period8/07/2412/07/24

Keywords

  • Hash function
  • Block cipher
  • Arithmetization-Oriented ·
  • Merkle tree
  • ZeroKnowledge
  • SNARK
  • Poseidon

Fingerprint

Dive into the research topics of 'On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing'. Together they form a unique fingerprint.

Cite this