International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 20 January 2023

Alexandr Bulkin, Tim Dokchitser
ePrint Report ePrint Report
There is a line of 'lookup' protocols to show that all elements of a sequence $f\in{\mathbb F}^n$ are contained in a table $t\in{\mathbb F}^d$, for some field ${\mathbb F}$. Lookup has become an important primitive in Zero Knowledge Virtual Machines, and is used for range checks and other parts of the proofs of a correct program execution. In this note we give several variants of the protocol. We adapt it to the situation when there are multiple lookups with the same table (as is usually the case with range checks), and handle also 'bounded lookup' that caps the number of repetitions.
Expand

Additional news items may be found on the IACR news page.