Multivariate lookups based on logarithmic derivatives

U Haböck - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Logarithmic derivatives translate products of linear factors into sums of their reciprocals,
turning zeroes into simple poles of same multiplicity. Based on this simple fact, we construct …

Improving logarithmic derivative lookups using GKR

S Papini, U Haböck - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this informal note, we instantiate the Goldwasser-Kalai-Rothblum (GKR) protocol to prove
fractional sumchecks as present in lookup arguments based on logarithmic derivatives, with …

plookup: A simplified polynomial protocol for lookup tables

A Gabizon, ZJ Williamson - Cryptology ePrint Archive, 2020 - eprint.iacr.org
We present a protocol for checking the values of a committed polynomial $ f\in\mathbb {F} _
{< n}[X] $ over a multiplicative subgroup $ H\subset\mathbb {F} $ of size $ n $, are contained …

flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size

A Gabizon, D Khovratovich - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present a protocol for checking the values of a committed polynomial $\phi (X) $ over a
multiplicative subgroup $ H\subset\mathbb {F} $ of size $ m $ are contained in a table …

cq: Cached quotients for fast lookups

L Eagen, D Fiore, A Gabizon - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present a protocol called $\mathsf {cq} $ for checking the values of a committed
polynomial $ f (X)\in\mathbb {F} _ {< n}(X) $ over a multiplicative subgroup …

Unlocking the lookup singularity with Lasso

S Setty, J Thaler, R Wahby - … International Conference on the Theory and …, 2024 - Springer
This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted
prover to commit to a vector a∈ F m and prove that all entries of a reside in some …

Caulk: Lookup arguments in sublinear time

A Zapico, V Buterin, D Khovratovich, M Maller… - Proceedings of the …, 2022 - dl.acm.org
We present position-hiding linkability for vector commitment schemes: one can prove in zero
knowledge that one or m values that comprise commitment\cm all belong to the vector of …

Space-efficient, side-channel attack resistant table lookups

SN Chari, JR Rao, P Rohatgi, H Scherzer - US Patent 7,142,670, 2006 - Google Patents
The field of information security deals with methods and mechanisms to protect sensitive
information. Some of these methods and mechanisms deal with the problem of main taining …

Tabulation-based 5-independent hashing with applications to linear probing and second moment estimation

M Thorup, Y Zhang - SIAM Journal on Computing, 2012 - SIAM
In the framework of Wegman and Carter, ak-independent hash function maps any k keys
independently. It is known that 5-independent hashing provides good expected performance …

Efficient KZG-Based Univariate Sum-Check and Lookup Argument

Y Zhang, SF Sun, D Gu - IACR International Conference on Public-Key …, 2024 - Springer
We propose a novel KZG-based sum-check scheme, dubbed Losum, with optimal efficiency.
Particularly, its proving cost is one multi-scalar-multiplication of size k—the number of non …