-
Notifications
You must be signed in to change notification settings - Fork 494
Description
Problem: Malicious Trusted Setup
As is widely known, Trusted Setup has certain drawbacks in zk-SNARKs. These cryptographic protocols rely on the assumption that the entities conducting the Trusted Setup, known as the CRS (Common Reference String) makers, will securely dispose of the setup information. This assumption is quite strong and can undermine the overall security of zk-SNARKs.
Related Work: Subversion Resistant zk-SNARKs
To address this issue, some research proposed a subversion-resistant setup. Subversion-resistant zk-SNARKs maintain robust zero-knowledge properties even if a malicious entity conducts the setup. In this approach, the CRS maker generates proof of the CRS's validity, which can be transparently verified by anyone. Additionally, implementing a subversion-resistant setup may only require an update to the Trusted Setup, making the associated costs not too high (as far as I know).
https://eprint.iacr.org/2017/587.pdf
https://eprint.iacr.org/2017/599.pdf
Proposal: Adoption of the Subversion-Resistant zk-SNARKs
I propose that Gnark adopt support for a subversion-resistant setup. This enhancement would significantly strengthen the zero-knowledge properties of Gnark.