shockingly simple crystals-dilithium zk proofs

โš“ General    ๐Ÿ“… 2025-01-17    ๐Ÿ‘ค chance    ๐Ÿ‘๏ธ 114      

chance

Warning

This post was published 75 days ago. The information described in this article may have changed.

Considerations when implementing zk proofs of crystals-dilithium signatures.

crystals-dilithium simplified

Weโ€™ll consider only the simplified scheme as described above. Discussion should be applicable to the full scheme.

Proving signature

With crystals-dilithium we must contend with a variable length signing procedure. Specifically we have to rejection sample based on the value of y, and generate a ball polynomial c based on a hash. Both of these operations are non-deterministic. e.g. itโ€™s expected that they must be retried (specifically the authors target 4-7 iterations).

Inside a zk circuit we can avoid variable length execution by doing the rejection sampling at witness generation time and providing a suitable y as an input. The circuit does not need to range check the z value inside the proof. Outputting a value outside the range leaks the secret key, so itโ€™s important that the witness calculation function operates correctly. In fact, we donโ€™t need to constrain the calculation of the c value either.

The verification procedure is robust and allows us to constrain relatively little of the signing procedure. Specifically we can take c, y, and s1 as inputs directly.

We must constrain only the following:

  • z=y+cs1 (โ„“ polynomial additions and โ„“ polynomial multiplications) (โ„“โ‰ˆ5)

unconstrained w1 and c calculation

The verifier calculates Az-ct. We can substitute z and t in this equation to get

A(y+cs1)-c(As1+s2)=Ay+Acs1-Acs1-cs2

The middle terms cancel leaving Ay-cs2

c and s2 are both of small norm and are filtered out by decomposing into the high bits of the coefficients yielding wโ€ฒ1. Because the verifier calculates the wโ€ฒ1 value, itโ€™s able to ensure that c was hashed appropriately even without explicit constraints in the zk circuit.

misc notes

Polynomials are in a ring with modulus X256+1 with coefficients in a field with scalar modulus โ‰ˆ223.

Depending on the architecture of the execution system we can do lazy reduction for the scalar operations. This is a compiler level optimization that is particularly relevant in systems with large native types (e.g. โ‰ˆ2256) that canโ€™t efficiently support montgomery/crt representation.

๐Ÿท๏ธ lattice, zk, signature

CPerezz    2025-01-24 ๐Ÿ‘ ๐Ÿ‘Ž

Have to take a deeper look to this. Please @chance forward this to the PQ team!! You should also check in with Antonio Sanso from EF.

On a sidenote, the high-bits/low-bits split happens, you need to be sure that the distribution is randomly sampled. Otherwise, youโ€™re at the risk of a significant security drop. At least this happens with regular ZKP world schemes.

2