Probability Models of Distributed Proof Generation for zk-SNARK-Based Blockchains

The paper is devoted to the investigation of the distributed proof generation process, which makes use of recursive zk-SNARKs. Such distributed proof generation, where recursive zk-SNARK-proofs are organized in perfect Mercle trees, was for the first time proposed in Latus consensus protocol for zk-SNARKs-based sidechains. We consider two models of a such proof generation process: the simplified one, where all proofs are independent (like one level of tree), and its natural generation, where proofs are organized in partially ordered set (poset), according to tree structure. Using discrete Markov chains for modeling of corresponding proof generation process, we obtained the recurrent formulas for the expectation and variance of the number of steps needed to generate a certain number of independent proofs by a given number of provers. We asymptotically represent the expectation as a function of the one variable n/m, where n is the number of provers m is the number of proofs (leaves of tree). Using results obtained, we give numerical recommendation about the number of transactions, which should be included in the current block, idepending on the network parameters, such as time slot duration, number of provers, time needed for proof generation, etc.

[1]  Mariia Rodinko,et al.  Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus , 2021, Sensors.

[2]  B. O’Neill The Classical Occupancy Distribution: Computation and Approximation , 2020, The American Statistician.

[3]  Jens Groth,et al.  On the Size of Pairing-Based Non-interactive Arguments , 2016, EUROCRYPT.

[4]  Mariia Rodinko,et al.  Decreasing security threshold against double spend attack in networks with slow synchronization , 2020, Comput. Commun..

[5]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[6]  Roman Oliynykov,et al.  Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).

[7]  Alberto Garoffolo,et al.  Sidechains: Decoupled Consensus Between Chains , 2018, ArXiv.

[8]  Jens Groth,et al.  Short Pairing-Based Non-interactive Zero-Knowledge Arguments , 2010, ASIACRYPT.

[9]  Mariia Rodinko,et al.  Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks , 2021, Cybernetics and Systems Analysis.

[10]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[11]  Edward A. Bender,et al.  Central and Local Limit Theorems Applied to Asymptotic Enumeration , 1973, J. Comb. Theory A.

[12]  Nico M. Temme,et al.  Asymptotic estimates of Stirling numbers , 1993 .

[13]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..