Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
Zero Knowledge Proofs with Sigma Protocols
Photo by Niklas Hamann on Unsplash
Sigma protocols are 3 phase protocols for proving knowledge of values in some relation without disclosing the values themselves. eg. knowledge of discrete log, i.e. given g and y, prove knowledge of x in gˣ = y without revealing x. This post will talk a bit about Sigma protocols and then describe how to construct Sigma protocols for various relations like knowledge of discrete log, equality of discrete log, inequality of 2 given discrete logs, knowledge of multiple discrete logs, knowledge of message and randomness in a Pedersen commitment, equality of message in 2 Pedersen commitments. Some code examples in Python are linked which work on elliptic curves to show various constructions. The objective of this post is not to explain theoretical notions or results of zero knowledge but rather to serve as an intro to zero knowledge for folks without much of academic background.
Some terminology: The value being proven knowledge of is called the witness. The other elements of the relation are collectively called instance. The entity proving the knowledge of witness is called prover. The other party that the prover needs to convince of the knowledge of witness is called the verifier. The prover convinces the verifier by sending a proof which the verifier verifies. In the discrete log example, x is the witness known only to the prover, g and y are the instance known to both prover and verifier.
A Sigma protocol follows these 3 steps:
- Commitment: The prover generates a random number, creates a commitment to that randomness and sends the commitment to the verifier.
- Challenge: After getting the commitment, the verifier generates a random number as a challenge and sends it to the prover. It is important that the verifier does not send the challenge before getting the commitment or else the prover can cheat.
- Response: The prover takes the challenge and creates a response using the random number chosen in step 1, the challenge and the witness. The prover will then send the response to the verifier who will do some computation and will or will not be convinced of the knowledge of the witness.
The above protocol is an interactive protocol meaning that both the prover and the verifier need to be online and be able to send messages to complete the protocol. But it can be made non-interactive by the Fiat-Shamir trick. This essentially means the verifier will not send a challenge in step 2 but the prover will simulate a challenge by using a hash function to hash something specific to this protocol execution. One possible candidate for this something is the commitment in step 1 and instance data. In this non-interactive protocol, the prover can create the proof and any verifier can verify it.
Proof of Knowledge of discrete log
Let's consider the discrete log example to better understand Sigma protocols. To prove knowledge of x in gˣ = y without revealing x,
- The prover generates a random number r, creates a commitment t = gʳ and sends t to the verifier.
- The verifier stores t, generates a random challenge c and sends it to the prover.
- The prover on receiving the challenge creates a response s = r + x*c. The prover sends this response to the verifier.
The verifier checks if gˢ equals yᶜ * t. This would be true since gˢ = gʳ⁺ˣ*ᶜ = gʳ * gˣ*ᶜ = t * y*ᶜ.
It is important that the prover always generates a new random value r and hence a new t = gʳ. If the prover uses the same r with the verifier, the verifier can learn x. This is howIn the first execution of the protocol i) the prover creates r and hence t = gʳ. ii) The verifier sends challenge c1 and iii) The prover sends s1 = r + x*c1. In the second execution of the protocol i) prover again chooses same r and hence generates same t = gʳ and sends it to verifier. ii) Now the verifier will know that prover has chosen the same r since he has seen this t before. The verifier sends another challenge c2. iii) The prover then sends s2 = r + x*c2The verifier thus has 2 linear equations s1 = r + x*c1 and s2 = r + x*c2. Since its the same r, the verifier now has s1- x*c1 = s2- x*c2. Since it knows c1 and c2 also, x = (s2-s1)/(c2-c1). The verifier has learnt x.
It is also important that the prover cannot predict the challenge. If he could, then he could prove the knowledge of x without actually knowing x. Lets see how1. Say the prover predicted the challenge to be c. He then constructs t in a different manner. t now equals gˢ*y⁻ᶜ. Here s is the response prover in send in 3rd step. He generated s randomly.2. The verifier sends the challenge as c as predicted.3. The prover will now send the s he chose in the 1st step.The verifier will as usual check if gˢ equals yᶜ.t. This would be true since yᶜ.t = yᶜ * gˢ * y⁻ᶜ = gˢ * yᶜ * y⁻ᶜ = gˢ *1 = gˢ.Hence the verifier is convinced that prover knows x without prover ever using x in above process.
Making the protocol non-interactive
Now if the prover and verifier engage in the non-interactive version of Sigma protocol, the interaction with verifier is avoided but that requires prover to use a hash function such that he cannot predict the output of the hash function else he can cheat as described above. Another advantage of the non-interactive version is that the verifier implementation is very simple as it does not need a random number generator. The non-interactive version is thus:
- The prover generates a random number r and creates a commitment t = gʳ. The prover hashes g, t and y to get challenge c. c = Hash(g, y, t).
- The prover creates a response to the challenge as s = r + c*x. The prover sends tuple (t, s) to the verifier.
The verifier now generates the same challenge c as Hash(g, y, t) and again checks if gˢ equals yᶜ.t. Python code demonstrating this protocol.
Now in some implementations, size of t is much bigger than c or s (t is a group element, c and s are field elements). In such a setting, the prover and verifier engage in a variation of the protocol where the prover does not send (t, s) but (c, s). This is how:
- The prover generates a random number r and creates a commitment t = gʳ. The prover hashes g, t and y to get challenge c. c = Hash(g, y, t).
- The prover creates a response to the challenge as s = r + c*x. The prover sends tuple (c, s) to the verifier.
The verifier will now:
- Reconstruct t using the equation gˢ = yᶜ.t. Thus t = gˢy⁻ᶜ.
- Reconstruct challenge c using c = Hash(g, y, t). If this reconstructed challenge c equals the one sent by the prover, the verifier is convinced of prover’s knowledge of x.
Lets consider some more examples of Sigma protocols using the non-interactive version. The prover and verifier can both create the same challenge.
Protocol 1. Equality of discrete logs
Say the prover knows the witness x in relation gˣ = y and hˣ = z where g, h, y and z are the instance. To convince a verifier of the same, they engage in the following protocol
- Prover generates 2 commitments in the commitment step, t1 = gʳ and t2 = hʳ committing to the same random number r.
- Prover creates challenge c = Hash(g, h, y, z, t1, t2).
- Prover creates response s = r + c*x. He now sends (t1, t2, s) to verifier. Noe that even though the commitments are different, the response is same for both commitments.
- Verifier checks if gˢ equals yᶜ * t and hˢ equals zᶜ * t.
Sample code for the protocol
Protocol 2. Conjunction (AND) of discrete logs
To prove that the prover knows a and b such that gᵃ = P AND hᵇ = Q, the prover follows the following protocol:
- Prover generates 2 random numbers r1 and r2 and corresponding commitments t1 = gʳ¹ and t2 = hʳ².
- Prover creates challenge c = Hash(g, h, P, Q, t1, t2).
- Prover creates responses s1 = r1 + a*c and s2 = r2 + b*c and sends (t1, t2, s1, s2) to verifier.
- Verifier checks if gˢ¹ equals Pᶜ * t1 and hˢ² equals Qᶜ * t2.
Above protocol is equivalent to executing 2 “knowledge of discrete log” protocols in parallel. The thing that binds the multiple executions is the challenge, which is same in both executions. This protocol can be trivially generalized to more than 2 discrete logs. Sample code for the protocol.
Protocol 3. Disjunction (OR) of discrete logs
Say there are 2 relations gᵃ = P and hᵇ = Q. The prover either knows a or b but not both. To convince the verifier that he knows one of a or b but not reveal which one he knows, the prover engages in 2 “parallel protocols” as above but cheats in one of those. The verifier knows that the prover cheated without knowing in which one. Say the prover knew a so he could only run the “one protocol honestly” (gᵃ = P).
- The prover generates a random number r1.
- Prover creates his first commitment t1 = gʳ¹ as usual.
- Here the prover cheats. He uses 2 different challenges for the relations. Also the response for relation he does not know witness of will be picked at random. Thus for 2nd protocol, he picks c2 as a random challenge and s2 as a random response.
- Now he constructs the 2nd commitment different from usual as t2 = hˢ² * Q⁻ᶜ².
- To get a challenge for first protocol, c1, prover hashes as usual to get c = Hash(g, h, P, Q, t1, t2). Now c1 = c- c2.
- Prover creates response s1 = r1 + a*c1. Prover now sends ( (t1, c1, s1), (t2, c2, s2) ) to the verifier.
- Verifier checks if gˢ¹ equals Pᶜ¹ * t1 and hˢ² equals Qᶜ² * t2.
Sample code.
Protocol 4. Knowledge of the opening of Pedersen commitment
A Pedersen commitment is a commitment scheme that lets the commiter commit to a message m as gᵐhʳ where r is the randomness. It lets the committer to create several commitments to the same value with the commitments being indistinguishable by choosing different randomness each time. The pair (m,r) is called the opening of the commitment. To prove the knowledge of the opening in commitment P = gᵐ * hʳ:
- Prover generates 2 random numbers r1 and r2 but creates a single commitment t as gʳ¹ * hʳ².
- Prover creates challenge c = Hash(g, h, P, t).
- Prover creates responses s1 = r1 + m*c and s2 = r2 + r*c and sends (t, s1, s2) to verifier.
- Verifier checks if gˢ¹ * hˢ² equals t * Pᶜ
Note that this is not the same as the conjunction of 2 discrete logs as the verifier does not know gᵐ or hʳ individually but only their product. This can again be trivially generalized to a vector Pedersen commitment, i.e. g1ᵐ¹ * g2ᵐ² * g3ᵐ³ * .. * hʳ. Sample code.
Protocol 5. Equality of opening of 2 Pedersen commitments
To prove that the opening of 2 Pedersen commitments P and Q are equal, i.e. P = g₁ᵃ * h₁ᵇ and Q = g₂ᵃ * h₂ᵇ, the following protocol is followed:
- Prover generates 2 random numbers r1 and r2 and creates 2 commitments t1 = g₁ʳ¹* h₁ʳ² and t2 = g₂ʳ¹ * h₂ʳ².
- Prover creates a challenge c = Hash(g₁, h₁, g₂, h₂, P, Q, t1, t2)
- Prover creates responses as s1 = r1 + a*c and s2 = r2 + b*c and sends (t1, t2, s1, s2) to verifier.
- Verifier checks if g₁ˢ¹ * h₁ˢ² equals Pᶜ * t1 and g₂ˢ¹ * h₂ˢ² equals Qᶜ * t2
This can trivially be generalized to vector Pedersen commitments or more than 2 Pedersen commitments. Sample code.
Protocol 6. Equality of message in 2 Pedersen commitments
To prove that 2 commitments are committed to the same message but with different randomness, i.e. P = g₁ᵃ * h₁ᵇ and Q = g₂ᵃ * h₂ᵈ where a is the message and b and d are randomness, the following protocol is followed:
- Prover generates 3 random numbers r1, r2 and r3 and creates 2 commitments t1 = g₁ʳ¹* h₁ʳ² and t2 = g₂ʳ¹ * h₂ʳ³.
- Prover creates challenge c = Hash(g₁, h₁, g₂, h₂, P, Q, t1, t2)
- Prover creates responses as s1 = r1 + a*c, s2 = r2 + b*c and s3 = r3 + d*c and sends (t1, t2, s1, s2, s3) to verifier.
- Verifier checks if g₁ˢ¹ * h₁ˢ² equals Pᶜ * t1 and g₂ˢ¹ * h₂ˢ³ equals Qᶜ * t2.
Sample code.
Note that whenever we prove some witness values are the same across different relations, the same random value is used in their corresponding commitments. Same random value r1 was used for message a in both t1 and t2 in the above protocol. In the previous protocol for equality of opening, same random values r1 and r2 were used in t1 and t2. Similarly for the equality of discrete log protocol.Also in the above protocols, different generators g₁, g₂, h₁, h₂ are used. But the protocol remains valid if generators are the same in both commitments, i.e. g₁ = g₂ and h₁ = h₂.
Protocol 7. Inequality of discrete logs
Lets say that the prover knows a discrete log a in gᵃ = P. He wants to convince the verifier that a is not equal to another discrete log b in hᵇ = Q. The prover might not know b but he can check that b is not same as a by comparing hᵃ and Q. The verifier might or might not b. The following protocol was originally described in this paper in section 6.
- Prover generates a random value r.
- Prover creates a commitment C = hᵃ*ʳ * Q⁻ʳ. Let's call a*r as alpha and -r as beta.
- Prover now needs to prove that when C is not 1, hᵃˡᵖʰᵃ * Qᵇᵉᵗᵃ = C AND gᵃˡᵖʰᵃ * Pᵇᵉᵗᵃ = 1. gᵃˡᵖʰᵃ * Pᵇᵉᵗᵃ = 1 is true since gᵃˡᵖʰᵃ * Pᵇᵉᵗᵃ = gᵃ*ʳ * P⁻ʳ = Pʳ * P⁻ʳ =1.
- Now 1 and C can both be viewed as Pedersen commitments to message alpha and randomness beta with different generators, h, Q, g, P. We already saw this in protocol 5. The prover executes protocol 5 to get (t1, t2, s1, s2). He then sends (C, t1, t2, s1, s2) to the verifier.
- Verifier checks that C is not equal to 1 and then runs his verification procedure as in protocol 5 on (t1, t2, s1, s2).
The sample code shows the full protocol. The sample code uses elliptic curve so 1 is equivalent to the identity element (the point at infinity) on the curve. The code uses variable iden for that which is obtained by subtracting a curve point from itself.
Generalization of Sigma protocols
I recently learned from this Dan Boneh’s video that such protocols are a special case of a generalization of a protocol to prove knowledge of a homomorphism pre-image (pre-image is input and image is output of a function). If you don’t know what homomorphism is then think of it as a function that gives a similar structure to the outputs as its inputs had. Exponentiation of a sum of numbers can be seen as a homomorphism as gᵃ⁺ᵇ =gᵃ * gᵇ.So let's say, the homomorphism is defined as a function f, where f(a) = gᵃ. To prove the knowledge of a, given common input f(a), i.e. gᵃ, the following protocol is executed:
- The prover generates a random number r and sends f(r) = gʳ to the verifier.
- The verifier sends a challenge c.
- The prover sends a response s = r + c*a.
- The verifier computes f(s) = gˢ and checks if it is equal to f(r) * f(a)ᶜ = gʳ * gᵃ*ᶜ.
As the video describes further, the above generalization can be used to prove some of the protocols described above. Let’s try that:
Protocol 8. Equality of discrete logs
gˣ = y and hˣ = z can be seen as inputs and outputs to this homomorphism f(a) = (gᵃ, hᵃ). So f(x) = (gˣ, hˣ). Now use the above generalization:
- The prover generates a random number r and sends the f(r) = (gʳ, hʳ) to the verifier.
- The verifier sends a challenge c.
- The prover sends a response s = r + c*a.
- The verifier computes f(s) = (gˢ, hˢ) and checks if it is equal to f(r) * f(a)ᶜ. f(r) * f(a)ᶜ = (gʳ, hʳ) * (gˣ, hˣ)*ᶜ = (gʳ⁺ᶜ*ˣ, hʳ⁺ᶜ*ˣ) = (gˢ, hˢ)
Protocol 9. Conjunction (AND) of discrete logs
gᵃ = P AND hᵇ = Q can be seen as a homomorphism f(a, b) = (gᵃ, hᵇ). Now use the above generalization:
- The prover generates 2 random numbers r1 and r2 and sends f(r1, r2) =(gʳ¹, hʳ²) to the verifier.
- The verifier sends a challenge c.
- The prover sends a response (s1, s2) where s1 = r1 + c*a and s2 = r2 + c*b.
- The verifier computes f(s1, s2) = (gˢ¹, hˢ²) and checks if it is equal to f(r1, r2) * f(a, b)ᶜ. f(r1, r2) * f(a, b)ᶜ = (gʳ¹, hʳ²) * (gᵃ, hᵇ)ᶜ = (gʳ¹⁺ᶜ*ᵃ, hʳ²⁺ᶜ*ᵇ) = (gˢ¹, hˢ²)
Protocol 9. Knowledge of opening of Pedersen commitment
The homomorphism can be seen as f(m, r) = gᵐ * hʳ. Again, use the above generalization:
- The prover generates 2 random numbers r1 and r2 and sends f(r1, r2) =gʳ¹ * hʳ² to the verifier.
- The verifier sends a challenge c.
- The prover sends a response (s1, s2) where s1 = r1 + c*m and s2 = r2 + c*r.
- The verifier computes f(s1, s2) = gˢ¹ * hˢ² and checks if it is equal to f(r1, r2) * f(m, r)ᶜ. f(r1, r2) * f(m, r)ᶜ = (gʳ¹ * hʳ²) * (gᵐ * hʳ)ᶜ = (gʳ¹ * hʳ²) * (gᵐ*ᶜ * hʳ*ᶜ) = gʳ¹⁺ᵐ*ᶜ * hʳ²⁺ʳ*ᶜ = gˢ¹ * hˢ²
I think some more protocols can be generalized but i am bored now ;)
Zero knowledge proofs with Sigma protocols was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.