Cache Timing Leakages in Zero-Knowledge Protocols

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

The area of modern zero-knowledge proof systems has seen a significant rise in popularity over the last couple of years, with new techniques and optimized constructions emerging on a regular basis. As the field matures, the aspect of implementation attacks becomes more relevant, however side-channel attacks on zero-knowledge proof systems have seen surprisingly little treatment so far. In this paper, we give an overview of potential attack vectors and show that some of the underlying finite field libraries, and implementations of heavily used components like hash functions using them, are vulnerable w.r.t. cache attacks on CPUs. On the positive side, we demonstrate that the computational overhead to protect against these attacks is relatively small.

Original languageEnglish
Title of host publication7th Conference on Advances in Financial Technologies
Subtitle of host publicationAFT 2025
EditorsZeta Avarikioti, Nicolas Christin
PublisherSchloss Dagstuhl - Leibniz-Zentrum für Informatik
Number of pages26
ISBN (Electronic)9783959774000
DOIs
Publication statusPublished - 6 Oct 2025
Event7th Conference on Advances in Financial Technologies, AFT 2025 - Pittsburgh, United States
Duration: 8 Oct 202510 Oct 2025

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume354
ISSN (Print)1868-8969

Conference

Conference7th Conference on Advances in Financial Technologies, AFT 2025
Country/TerritoryUnited States
CityPittsburgh
Period8/10/2510/10/25

Keywords

  • cache timing
  • leakage
  • protocol
  • side-channel
  • zero-knowledge

ASJC Scopus subject areas

  • Software

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'Cache Timing Leakages in Zero-Knowledge Protocols'. Together they form a unique fingerprint.

Cite this