Cryptographic proof systems have a plethora of applications: from building other cryptographic tools (e.g., malicious security for MPC protocols) to concrete settings such as private transactions or rollups. In several settings it is important for proof systems to be non-malleable: an adversary should not to be able to modify a proof they have observed into another for a statement for which they do not know the witness. Proof systems that have been deployed in practice should arguably satisfy this notion: it is crucial in settings such as transaction systems and in order to securely compose proofs with other cryptographic protocols. As a consequence, results on non-malleability should keep up with designs of proofs being deployed. Recently, Arun et al. proposed
SNARKs for virtual machines are non-malleable
Cryptology ePrint Archive, Paper 2024/1551, 3 October 2024
Type:
Report
Date:
2024-10-03
Department:
Digital Security
Eurecom Ref:
7893
Copyright:
IACR
See also:
PERMALINK : https://www.eurecom.fr/publication/7893