Unlocking the lookup singularity with Lasso

S Setty, J Thaler, R Wahby - … International Conference on the Theory and …, 2024 - Springer
This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted
prover to commit to a vector a∈ F m and prove that all entries of a reside in some …

plookup: A simplified polynomial protocol for lookup tables

A Gabizon, ZJ Williamson - Cryptology ePrint Archive, 2020 - eprint.iacr.org
We present a protocol for checking the values of a committed polynomial $ f\in\mathbb {F} _
{< n}[X] $ over a multiplicative subgroup $ H\subset\mathbb {F} $ of size $ n $, are contained …

cq: Cached quotients for fast lookups

L Eagen, D Fiore, A Gabizon - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present a protocol called $\mathsf {cq} $ for checking the values of a committed
polynomial $ f (X)\in\mathbb {F} _ {< n}(X) $ over a multiplicative subgroup …

Caulk: Lookup arguments in sublinear time

A Zapico, V Buterin, D Khovratovich, M Maller… - Proceedings of the …, 2022 - dl.acm.org
We present position-hiding linkability for vector commitment schemes: one can prove in zero
knowledge that one or m values that comprise commitment\cm all belong to the vector of …

Baloo: nearly optimal lookup arguments

A Zapico, A Gabizon, D Khovratovich… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present Baloo, the first protocol for lookup tables where the prover work is linear on the
amount of lookups and independent of the size of the table. Baloo is built over the lookup …

Jolt: Snarks for virtual machines via lookups

A Arun, S Setty, J Thaler - Annual International Conference on the Theory …, 2024 - Springer
Abstract Succinct Non-interactive Arguments of Knowledge (SNARKs) allow an untrusted
prover to establish that it correctly ran some “witness-checking procedure” on a witness. A …

Dory: Efficient, transparent arguments for generalised inner products and polynomial commitments

J Lee - Theory of Cryptography Conference, 2021 - Springer
This paper presents Dory, a transparent setup, public-coin interactive argument for inner-
pairing products between committed vectors of elements of two source groups. For a product …

HyperNova: Recursive arguments for customizable constraint systems

A Kothapalli, S Setty - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper introduces HyperNova, a recursive argument for proving incremental
computations whose steps are expressed with CCS (Setty et al. ePrint 2023/552), a …

Linear-size constant-query IOPs for delegating computation

E Ben-Sasson, A Chiesa, L Goldberg, T Gur… - Theory of Cryptography …, 2019 - Springer
We study the problem of delegating computations via interactive proofs that can be
probabilistically checked. Known as interactive oracle proofs (IOPs), these proofs extend …

SLAP: succinct lattice-based polynomial commitments from standard assumptions

MR Albrecht, G Fenzi, O Lapiha, NK Nguyen - … International Conference on …, 2024 - Springer
Recent works on lattice-based extractable polynomial commitments can be grouped into two
classes:(i) non-interactive constructions that stem from the functional commitment by …