MultiversX Tracker is Live!

When using Groth16 on Ethereum through ᴇɪᴘ‒197, is it really needed to change both G₂ points of the public & private inputs in the trusted setup for avoiding public input forgery ?

Etherum Reddit

More / Etherum Reddit 78 Views

When using Groth16 on Ethereum through ᴇɪᴘ‒197, is it really needed to change both G₂ points of the public & private inputs in the trusted setup for avoiding public input forgery ?

First remember Ethereum only allow to check if a set of pairings is equal to 1 in Fp12 and not to compare equalities like in Zcash which is why the equations below are different and would worth downvotes on a cryptographic sub as a result… Otherwise I recognize this is more a mathematical problem but the place where I’m the most likely to find someone who do understand it remains on Ethereum as it’s partly cryptocurrency math specific.

For those who don’t know about Groth16 :

By convention, public portions of the witness are the first ℓ elements of the vector a. To make those elements public, the prover simply reveals them :

[a₁,a₂,…,aℓ]

For the verifier to test that those values were in fact used, verifier must carry out some of the computation that the prover was originally doing.

Specifically, the prover computes :

Sorry, but no MathJax on reddit

Note that only the computation of [C]₁ changed -- the prover only uses the ai and Ψi terms ℓ+1 to m.

The verifier computes the first ℓ terms of the sum:

Sorry but no MathJax on reddit

And the ᴇɪᴘ‒197 equation in the case of Ethereum on Fp12 is : 1?=[A]₁∙[B]₂×[α]₁∙[β]₂×[X]₁∙G₂×[C]₁∙G

Part 2 : Separating the public inputs from the private inputs with γ and δ

The first attack described in the tutorial I read and how it’s said to be prevented :

The assumption in the equation above is that the prover is only using Ψ(ℓ+1) to Ψm to compute [C]₁, but nothing stops a dishonest prover from using Ψ to Ψℓ to compute [C]₁, leading to a forged proof.

For example, here is our current ᴇɪᴘ‒197 verification equation :

Sorry but no MathJax on reddit

If we expand the C term under the hood, we get the following :

Sorry but no MathJax on reddit

Suppose for example and without loss of generality that a=[1,2,3,4,5] and ℓ=3. In that case, the public part of the witness is [1,2,3] and the private part is [4,5].

The final equation after evaluating the witness vector would be as follows :

Sorry but no MathJax on reddit

However since the discrete logarithm between the public and private point in G₂ is 1, nothing stops the prover from creating an valid portion of the public witness as [1,2,0] and moving the zeroed out public portion to the private part of the computation as follows :

Sorry but no MathJax on reddit

The equation above is valid, but the witness does not necessarily satisfy the original constraints.

Therefore, we need to prevent the prover from using Ψ to Ψℓ as part of the computation of [C]₁.

Introducing γ and δ :

To avoid the problem above, the trusted setup introduces new scalars γ and δ to force Ψℓ+1 to Ψm to be separate from Ψ to Ψℓ. To do this, the trusted setup divides (multiplies by the modular inverse) the private terms (that constitute [C]₁) by γ and the public terms (that constitute [X]₁, the sum the verifier computes) by δ.

Since the h(τ)t(τ) term is embedded in [C]₁, those terms also need to be divided by γ.

Again, no MathJax on reddit

The trusted setup publishes

Maybe I could use text for that one ?

The prover steps are the same as before and the verifier steps now include pairing by [γ]₂ and [δ]₂ to cancel out the denominators :

The ᴇɪᴘ‑197 with Groth16 as it’s expected to be

The thing I’m not understanding :

So it seems to me the description above is the attack is possible because the 2 G₂ points resulting from the witness input split for public inputs are equals and thus the discrete logarithm is know since it’s equal, In the other case why is it required to modify both the private and public terms ? How could proofs be still faked without knowing the discrete logarithms between δ and G₂ ?
Why not just divide the private terms that constitute [C]₁ by δ and leave the public terms as is ? This would mean :

Please compare with the last equation above and the first unmodified verifying equation

submitted by /u/AbbreviationsGreen90
[link] [comments]

Get BONUS $200 for FREE!

You can get bonuses upto $100 FREE BONUS when you:
💰 Install these recommended apps:
💲 SocialGood - 100% Crypto Back on Everyday Shopping
💲 xPortal - The DeFi For The Next Billion
💲 CryptoTab Browser - Lightweight, fast, and ready to mine!
💰 Register on these recommended exchanges:
🟡 Binance🟡 Bitfinex🟡 Bitmart🟡 Bittrex🟡 Bitget
🟡 CoinEx🟡 Crypto.com🟡 Gate.io🟡 Huobi🟡 Kucoin.



Comments