Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)

Chaya Ganesh, Claudio Orlandi, Mahak Rakesh Pancholi, Akira Takahashi, Daniel Tschudi

Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

Abstract

Bulletproofs (Bünz et al., in: 2018 IEEE symposium on security and privacy, IEEE Computer Society Press, pp 315–334, 2018) are a celebrated ZK proof system that allows for short and efficient proofs, and have been implemented and deployed in several real-world systems. In practice, they are most often implemented in their non-interactive version obtained using the Fiat–Shamir transform. A security proof for this setting is necessary for ruling out malleability attacks. These attacks can lead to very severe vulnerabilities, as they allow an adversary to forge proofs re-using or modifying parts of the proofs provided by the honest parties. An earlier version of this work (Ganesh et al., in: EUROCRYPT 2022, Part II. LNCS, vol 13276, Springer, Cham, pp 397–426, 2022) provided evidence for non-malleability of Fiat–Shamir Bulletproofs. This was done by proving simulation-extractability, which implies non-malleability, in the algebraic group model. In this work, we generalize the former result and prove simulation-extractability in the programmable random oracle model, removing the need for the algebraic group model. Along the way, we establish a generic chain of reductions for Fiat–Shamir-transformed multi-round public-coin proofs to be simulation-extractable in the (programmable) random oracle model, which may be of independent interest.

Original languageEnglish
Article number11
JournalJournal of Cryptology
Volume38
Issue1
ISSN0933-2790
DOIs
Publication statusPublished - Jan 2025

Keywords

  • Bulletproofs
  • Non-interactive zero knowledge proof
  • Non-malleability
  • Random oracle model
  • Simulation-extractability

Fingerprint

Dive into the research topics of 'Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model)'. Together they form a unique fingerprint.

Cite this