More about HKUST
Scaling Verifiable Computations with Hidden-order RSA Groups
PhD Qualifying Examination Title: "Scaling Verifiable Computations with Hidden-order RSA Groups" by Mr. Jiajun XIN Abstract: Verifiable computation (VC) enables an untrusted server to prove the correct execution of a computation to a client that only needs to spend minimal effort for verification. Initially mostly a theoretical concept, recent advancements in succinct non-interactive arguments of knowledge (SNARKs) have transformed VC into a tool with significant real-world applications. For instance, verifiable computation has been instrumental in addressing problems such as verifiable databases, zkRollups, authenticated cloud computing, data auditing, decentralized identities, etc. Despite this, verifiable computation suffers from high computational overheads for the prover, which limits its scalability and broader adoption in practice. This thesis explores methods to overcome these limitations and scale verifiable computation effectively using hidden-order RSA groups. Specifically, it focuses on three key aspects: 1) applying verifiable computation to real-world problems, specifically by designing a proof-of-solvency system for cryptocurrency exchanges; 2) efficiently integrating large datasets into SNARKs; 3) building new cryptographic tools with novel verifiability features. In the first part of this thesis, we combine RSA accumulators with SNARKs to efficiently compute the sum of millions of committed values, applying this technique to dynamic proofs of liabilities. In the second part, we optimize the efficiency of RSA + SNARK compositions by eliminating a previously required step, significantly improving performance under a novel hardness assumption. In the final part, we extend the scope of verifiable computation to time-locked settings by introducing verifiable time-lock puzzles (VTLPs). Unlike traditional time-lock puzzles, where solvers have no guarantee about the correctness of the solution they reveal, VTLPs allow the generator to publish a succinct proof that the solution satisfies specific properties without revealing additional information. This bridges the gap between time-lock puzzles and verifiable computation, enabling new applications in time-sensitive cryptographic protocols. Date: Monday, 26 May 2025 Time: 2:00pm - 4:00pm Venue: Room 2128A Lift 19 Committee Members: Dr. Dimitris Papadopoulos (Supervisor) Prof. Cunsheng Ding (Chairperson) Prof. Ke Yi