Skip to content

feat: subversion resistant setup #1509

@akakou

Description

@akakou

Problem: Malicious Trusted Setup

As is widely known, Trusted Setup has certain drawbacks in zk-SNARKs. These cryptographic protocols rely on the assumption that the entities conducting the Trusted Setup, known as the CRS (Common Reference String) makers, will securely dispose of the setup information. This assumption is quite strong and can undermine the overall security of zk-SNARKs.

Related Work: Subversion Resistant zk-SNARKs

To address this issue, some research proposed a subversion-resistant setup. Subversion-resistant zk-SNARKs maintain robust zero-knowledge properties even if a malicious entity conducts the setup. In this approach, the CRS maker generates proof of the CRS's validity, which can be transparently verified by anyone. Additionally, implementing a subversion-resistant setup may only require an update to the Trusted Setup, making the associated costs not too high (as far as I know).

https://eprint.iacr.org/2017/587.pdf
https://eprint.iacr.org/2017/599.pdf

Proposal: Adoption of the Subversion-Resistant zk-SNARKs

I propose that Gnark adopt support for a subversion-resistant setup. This enhancement would significantly strengthen the zero-knowledge properties of Gnark.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions