ARC: Accumulation for Reed-Solomon Codes
/ 8 min read
This work is supported by a grant from the Mina Foundation
Introduction
Proof-Carrying Data (PCD) has emerged as a fundamental tool in cryptography, enabling the verification of incremental distributed computations. PCD finds applications across various domains, from enforcing language semantics in distributed settings to blockchain consensus protocols. The current state-of-the-art PCD constructions rely heavily on accumulation or folding schemes.
However, most existing accumulation schemes face significant limitations:
-
Homomorphic Vector Commitments: Nearly all known constructions depend on homomorphic vector commitments, leading to:
- High computational costs from expensive group operations
- Vulnerability to quantum attacks (for discrete log-based schemes)
- Inability to leverage advances in IOP-based SNARKs
-
Bounded Accumulation: Recent hash-based approaches introduce bounds on consecutive accumulation steps, limiting the depth of PCD computation graphs and affecting efficiency.
ARC (Accumulation for Reed-Solomon Codes) presents a novel solution that overcomes these limitations through an unbounded hash-based accumulation scheme. The core innovation is a new accumulation scheme for claims about proximity to Reed-Solomon codes.
Preliminaries
Before diving into ARC’s technical details, let’s establish the key mathematical concepts and notations used throughout the paper.
Reed-Solomon Codes
A Reed-Solomon code is defined over a field and evaluation domain , with degree parameter . It consists of all functions that can be expressed as evaluations of polynomials of degree less than :
The rate of the code is defined as . For a codeword in , we denote by its unique polynomial representation.
Distance Measures
For words , we define:
- Relative Hamming distance: is the fraction of points in where and disagree
- δ-close: Two words are -close if
- δ-far: Two words are -far if
- Distance to code:
Polynomial Quotients
For a word and points , we define the quotient:
where:
- is the Lagrange interpolation of points
- is the vanishing polynomial
List Decoding
For parameters and , a Reed-Solomon code is -list decodable if for any word , there are at most codewords that are -close to . The Johnson bound states that is -list decodable for any .
Random Linear Combinations
A key principle used in ARC is that random linear combinations preserve distance properties. Specifically, if and are -far from the code, then for random :
is also -far from the code with high probability over .
This preliminary knowledge forms the foundation for understanding ARC’s accumulation scheme and its efficiency guarantees. The interplay between these concepts - particularly the relationship between polynomial quotients and distance preservation - is central to ARC’s design.
Key Techniques
Reed-Solomon Proximity Claims
At the heart of ARC is a many-to-one reduction for Reed-Solomon proximity claims. Let’s break down the key concepts:
Background:
- Let be a subset of field of size (evaluation domain)
- Reed-Solomon code RS[d] ⊂ contains words consistent with polynomials of degree < d
- The quotient of a word relative to points is defined as:
Key Properties:
- If is a codeword in RS[d] with , then is a codeword in RS[d-1]
- If is δ-close to RS[d-1], then is δ-close to a codeword with
- If is δ-far from any codeword with , then is δ-far from RS[d-1]
The ARC Protocol
ARC introduces a novel distance-preserving reduction for Reed-Solomon proximity claims that avoids the limitations of bounded accumulation depth. Let’s examine the protocol in detail.
Protocol Overview
The core protocol operates on proximity claims about two vectors . The goal is to reduce the claim that both vectors are -close to to a claim that a single vector is -close to .
Protocol Steps
-
Initial Setup and Random Combination
- Verifier samples random challenge
- Prover computes and sends word
- In the honest case,
- This step leverages proximity gaps for Reed-Solomon codes: if either or is -far from the code, then will be -far with high probability
-
Out-of-Domain Sampling
- Verifier samples
- Prover responds with claimed evaluation
- When is less than list-decoding radius, this ensures uniqueness of nearby codewords
- With high probability, there exists a unique codeword in the -ball satisfying
-
In-Domain Query Selection
- Verifier samples locations
- Parameter determines number of queries
- These points will be used to define the quotient polynomial
-
Quotient Formation
- For each , verifier computes
- Let be the combined query set
- Define function where:
- for
- Prover sends
- The quotient is defined as:
-
Final Reduction
- The protocol reduces to the claim that is -close to
- Key properties of this reduction:
- Claim size is independent of number of accumulated claims
- Distance properties are preserved exactly
- No error amplification occurs
Soundness Analysis
The soundness of the protocol relies on several key properties:
-
Random Combination Property
- If either or is -far from , then will be -far with high probability over
-
Out-of-Domain Uniqueness
- With probability at least , different codewords in the list-decoding radius will evaluate differently at random points
- This ensures unique binding to a nearby codeword when one exists
-
In-Domain Coverage
- With probability at least , the in-domain queries will detect if is -far from any codeword agreeing with on
-
Distance Preservation
- If is -far from any codeword with for all , then is -far from
- This crucial property enables unbounded accumulation
The protocol achieves soundness error when:
- Field size
- Distance parameter
- Query parameter
Efficiency Characteristics
The protocol achieves essentially optimal parameters:
- Verifier makes Merkle tree openings
- Under common list-decoding conjectures, this reduces to
- Prover computation requires field operations
- All costs are independent of accumulation depth
This construction enables efficient, unbounded accumulation while maintaining optimal parameters relative to the code rate, representing a significant advance over prior bounded-depth constructions.
Applications and Future Directions
The unbounded hash-based accumulation scheme introduced by ARC opens up several exciting possibilities across different domains of cryptography and distributed systems.
Zero-Knowledge Proof Systems
ARC’s ability to work with Reed-Solomon codes makes it particularly valuable for IOP-based SNARKs. Most modern SNARK systems use Reed-Solomon encodings as a core building block, and ARC’s efficient accumulation scheme can be directly integrated into these systems. This could enable new proof systems that combine the efficiency of IOPs with unbounded recursion, without relying on expensive elliptic curve operations.
A particularly promising application is in systems like STIR that already use Reed-Solomon proximity testing. ARC could replace their low-degree testing components with accumulation, potentially leading to more efficient recursive proofs. This would be especially valuable in scenarios requiring deep recursion, such as blockchain light clients or long-running computation verification.
Blockchain and Consensus Systems
ARC’s unbounded accumulation depth makes it particularly well-suited for blockchain applications. Current systems like Mina that use proof-carrying data for blockchain compression could benefit from ARC’s efficiency improvements. The ability to accumulate an unlimited number of proofs without degradation could enable new approaches to blockchain compression and verification.
Moreover, ARC’s hash-based nature provides better quantum resistance compared to discrete-log based schemes, making it a candidate for post-quantum secure blockchain systems. This could be particularly relevant as quantum computing advances threaten current cryptographic assumptions.
Distributed Systems
The scheme’s ability to efficiently combine multiple proofs while preserving their properties suggests applications in distributed computation verification. For example:
- Distributed MapReduce computations could use ARC to accumulate proof fragments from different workers
- Cloud computing platforms could provide verifiable computation guarantees by accumulating proofs of individual computation steps
- Microservice architectures could implement end-to-end verification by accumulating proofs across service boundaries
The development of ARC represents not just a technical advancement in accumulation schemes, but potentially a new direction in the design of cryptographic protocols. Its unique combination of unbounded depth, optimal efficiency, and post-quantum security opens up possibilities that were previously impractical or impossible.
References
-
Bünz, B., Mishra, P., Nguyen, W., & Wang, W. (2024). ARC: Accumulation for Reed—Solomon Codes. Cryptology ePrint Archive, Paper 2024/1731.
-
Chiesa, A., Chiesa, A., Fenzi, G., & Yogev, E. (2024). STIR: Reed-Solomon Proximity Testing with Fewer Queries. Proceedings of the 44th Annual International Cryptology Conference (CRYPTO ‘24), 380-413.
-
Bünz, B., Chiesa, A., Lin, W., Mishra, P., & Spooner, N. (2021). Proof-Carrying Data Without Succinct Arguments. Proceedings of the 41st Annual International Cryptology Conference (CRYPTO ‘21), 681-710.
-
Bünz, B., Mishra, P., Nguyen, W., & Wang, W. (2024). Accumulation without Homomorphism. Cryptology ePrint Archive, Report 2024/474.
-
Ben-Sasson, E., Goldberg, L., Kopparty, S., & Saraf, S. (2020). DEEP-FRI: Sampling Outside the Box Improves Soundness. Proceedings of the 11th Innovations in Theoretical Computer Science Conference (ITCS ‘20), 5:1-5:32.
-
Ben-Sasson, E., Carmon, D., Ishai, Y., Kopparty, S., & Saraf, S. (2023). Proximity Gaps for Reed-Solomon Codes. Journal of the ACM, 70(5), 31:1-31:57.
-
Kothapalli, A., & Setty, S. T. V. (2024). HyperNova: Recursive Arguments for Customizable Constraint Systems. Proceedings of the 44th Annual International Cryptology Conference (CRYPTO ‘24), 345-379.
-
Kothapalli, A., Setty, S. T. V., & Tzialla, I. (2022). Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. Proceedings of the 42nd Annual International Cryptology Conference (CRYPTO ‘22), 359-388.