plookup: A simplified polynomial protocol for lookup tables

A Gabizon, ZJ Williamson - Cryptology ePrint Archive, 2020 - eprint.iacr.org
We present a protocol for checking the values of a committed polynomial $ f\in\mathbb {F} _
{< n}[X] $ over a multiplicative subgroup $ H\subset\mathbb {F} $ of size $ n $, are contained …

cq: Cached quotients for fast lookups

L Eagen, D Fiore, A Gabizon - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present a protocol called $\mathsf {cq} $ for checking the values of a committed
polynomial $ f (X)\in\mathbb {F} _ {< n}(X) $ over a multiplicative subgroup …

Unlocking the lookup singularity with Lasso

S Setty, J Thaler, R Wahby - … International Conference on the Theory and …, 2024 - Springer
This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted
prover to commit to a vector a∈ F m and prove that all entries of a reside in some …

Caulk: Lookup arguments in sublinear time

A Zapico, V Buterin, D Khovratovich, M Maller… - Proceedings of the …, 2022 - dl.acm.org
We present position-hiding linkability for vector commitment schemes: one can prove in zero
knowledge that one or m values that comprise commitment\cm all belong to the vector of …

Baloo: nearly optimal lookup arguments

A Zapico, A Gabizon, D Khovratovich… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present Baloo, the first protocol for lookup tables where the prover work is linear on the
amount of lookups and independent of the size of the table. Baloo is built over the lookup …

Jolt: Snarks for virtual machines via lookups

A Arun, S Setty, J Thaler - Annual International Conference on the Theory …, 2024 - Springer
Abstract Succinct Non-interactive Arguments of Knowledge (SNARKs) allow an untrusted
prover to establish that it correctly ran some “witness-checking procedure” on a witness. A …

HyperNova: Recursive arguments for customizable constraint systems

A Kothapalli, S Setty - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper introduces HyperNova, a recursive argument for proving incremental
computations whose steps are expressed with CCS (Setty et al. ePrint 2023/552), a …

The discrete-logarithm problem with preprocessing

H Corrigan-Gibbs, D Kogan - … 37th Annual International Conference on the …, 2018 - Springer
This paper studies discrete-log algorithms that use preprocessing. In our model, an
adversary may use a very large amount of precomputation to produce an “advice” string …

Efficient circuit-based PSI via cuckoo hashing

B Pinkas, T Schneider, C Weinert, U Wieder - … International Conference on …, 2018 - Springer
While there has been a lot of progress in designing efficient custom protocols for computing
Private Set Intersection (PSI), there has been less research on using generic Multi-Party …

Linear-size constant-query IOPs for delegating computation

E Ben-Sasson, A Chiesa, L Goldberg, T Gur… - Theory of Cryptography …, 2019 - Springer
We study the problem of delegating computations via interactive proofs that can be
probabilistically checked. Known as interactive oracle proofs (IOPs), these proofs extend …