-
Notifications
You must be signed in to change notification settings - Fork 3
Description
The process for generating the random value,
For an attacker who is seeking to hide an additive attack, the goal might be to produce values that will result in the following two equalities:
Within these constraints, there is a lot of flexibility, and because the prover gets to pick a set of values, test out what value of
Maybe this only points to a need for a larger prime, but I think that it would be safer if we went with an interactive protocol.
The overall latency and communication cost benefits of this Fiat-Shamir approach are not necessarily better than interactive. The verifiers used shared randomness to generate
The real cost to an interactive protocol is the potential for added latency. The protocol now has fewer straight line dependencies. The prover can do all of its work without communication. The latency only occurs between verifiers, but the second verifier has all values it needs from the outset. The first verifier needs to wait for both the prover to provide shares and the second verifier to share its hash, but these two sources of information only have computation to do. The second verifier needs to wait for the first verifier only. An interactive protocol forces the prover to stop and wait.