Title: Non-interactive delegation and batch NP verification from standard computational assumptions
Abstract: We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational PIR scheme, which in turn can be based on standard polynomial-time cryptographic assumptions (e.g. the worst case hardness of polynomial-factor approximation of short-vector lattice problems). In our protocol, the verifier sets up a public key ahead of time, and this key can be used by any prover to prove arbitrary statements by simpling sending a proof to the verifier. Verification is done using a secret verification key, and soundness relies on this key not being known to the prover. Our protocol further allows to prove statements about computations of arbitrary RAM machines.
Publication Year: 2017
Publication Date: 2017-06-19
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 47
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot