Scaling Verifiable Computations with Hidden-order RSA Groups

PhD Qualifying Examination


Title: "Scaling Verifiable Computations with Hidden-order RSA Groups"

by

Mr. Jiajun XIN


Abstract:

Verifiable computation (VC) enables an untrusted server to prove the correct 
execution of a computation to a client that only needs to spend minimal 
effort for verification. Initially mostly a theoretical concept, recent 
advancements in succinct non-interactive arguments of knowledge (SNARKs) 
have transformed VC into a tool with significant real-world applications. 
For instance, verifiable computation has been instrumental in addressing 
problems such as verifiable databases, zkRollups, authenticated cloud 
computing, data auditing, decentralized identities, etc. Despite this, 
verifiable computation suffers from high computational overheads for the 
prover, which limits its scalability and broader adoption in practice. This 
thesis explores methods to overcome these limitations and scale verifiable 
computation effectively using hidden-order RSA groups. Specifically, it 
focuses on three key aspects: 1) applying verifiable computation to 
real-world problems, specifically by designing a proof-of-solvency system 
for cryptocurrency exchanges; 2) efficiently integrating large datasets into 
SNARKs; 3) building new cryptographic tools with novel verifiability 
features.

In the first part of this thesis, we combine RSA accumulators with SNARKs to 
efficiently compute the sum of millions of committed values, applying this 
technique to dynamic proofs of liabilities. In the second part, we optimize 
the efficiency of RSA + SNARK compositions by eliminating a previously 
required step, significantly improving performance under a novel hardness 
assumption. In the final part, we extend the scope of verifiable computation 
to time-locked settings by introducing verifiable time-lock puzzles (VTLPs). 
Unlike traditional time-lock puzzles, where solvers have no guarantee about 
the correctness of the solution they reveal, VTLPs allow the generator to 
publish a succinct proof that the solution satisfies specific properties 
without revealing additional information. This bridges the gap between 
time-lock puzzles and verifiable computation, enabling new applications in 
time-sensitive cryptographic protocols.


Date:                   Monday, 26 May 2025

Time:                   2:00pm - 4:00pm

Venue:                  Room 2128A
                        Lift 19

Committee Members:      Dr. Dimitris Papadopoulos (Supervisor)
                        Prof. Cunsheng Ding (Chairperson)
                        Prof. Ke Yi