Abstract
An aggregatable subvector commitment scheme extends a vector commitment scheme by enabling the aggregation of multiple proofs into a single compact subvector proof. However, the existing schemes have to recompute proofs for each position when inserting an element into the vector, incurring significant computational overhead. In this paper, we propose a novel aggregatable subvector commitment scheme based on Newton interpolation, which efficiently supports the addition of new elements. Specifically, the proposed scheme allows incremental updates to the commitment and proofs for each position, avoiding the requirement for full recomputation and thereby significantly reducing computational overhead. Additionally, we employ the Karatsuba algorithm to efficiently perform large-integer multiplication, which improves the aggregation and verification of proofs. Finally, we implement the proposed scheme and conduct a detailed comparison with aSVC. Experimental results demonstrate that the proposed scheme achieves a 48× speedup when adding an element to a 16-length vector, as well as 2.13× and 1.73× speedups for aggregating eight proofs and performing verification, respectively.
    1. Introduction
Vector commitment (VC) [,,,,,,,,,,,,,] allows the committer to submit an ordered sequence of messages  of size n, generate a commitment value C that contains all the messages for which we cannot tell whether the commitment value C is generated for  or for , and also to generate its location proof  for each position of the message at the location. When a verifier wants to check if a specific message  is at the i-th position, the committer sends the proof , the commitment value C, and the message . The verifier uses this information to validate the location proof . If the verification is successful, it confirms that  is indeed located at the i-th position.
VC is an efficient cryptographic tool that protects the privacy and integrity of data, and thus, has a wide range of potential applications in several fields. For example, in the field of blockchain technology, VC can protect user privacy and verify the validity of transactions. In particular, in the VC []-based stateless cryptocurrency system, the verifier only needs to store the vector commitment of the user’s account balance without maintaining the state of the entire ledger. When a user initiates a transfer, he/she only needs to submit the transaction and prove his/her account balance, and the validator will verify the correctness of the balance upon receiving the transaction, and if the validation passes, the transaction proceeds normally. Additionally, in the context of cloud storage, vector commitments [] enable users to generate compact proofs for their uploaded data, allowing cloud service providers to verify data integrity efficiently. This approach significantly reduces storage requirements and communication overhead compared to conventional methods. Vector commitments also exhibit substantial utility in the domains of zero-knowledge proofs. Specifically, within zero-knowledge proof [,,,] protocols, they enable the prover to demonstrate the satisfaction of specific set conditions without disclosing additional information. This is particularly valuable in large-scale data analytics or machine learning applications, where vector commitments can validate the participation of individual data points or the accuracy of computational outcomes, thereby enhancing the overall credibility of data processing procedures.
In order to improve the efficiency of verification, some commitment schemes [,,,] introduce the concept of subvector, i.e., multiple proofs of transactions can be aggregated into a concise single proof, thus further reducing the verification overhead. After the verification passes, we need to update the account status and its proofs in a timely manner in order to improve the updating efficiency. Thus, some scholars have proposed new vector commitment schemes [,,], aiming to improve the efficiency of such updating. However, the existing VC schemes mainly focus on vectors of fixed size. When a new value is appended to the vector, the client has to recompute the commitment and proofs for all positions, leading to significant computational overhead. In this work, we explore an efficient aggregatable subvector commitment scheme that supports the dynamic addition of new values.
1.1. Our Contributions
In this paper, we propose a new aggregatable subvector commitment vector based on Newton interpolation, which can efficiently update the commitment and proofs when inserting a new value into the vector. Table 1 provides a brief comparison with previous research work. Our primary contributions can be outlined as follows:
 
       
    
    Table 1.
    Comparison with previous work using aSVC.
  
- This paper proposes a novel aggregatable subvector commitment scheme based on Newton interpolation. When appending a value to the vector, it eliminates the need to fully recompute the original commitment value and proofs. Instead, the client incrementally updates the commitment and proofs for each position, significantly reducing computational overhead.
- The Karatsuba algorithm can efficiently perform large-integer multiplication, which can reduce the computational overhead from to for the multiplication of two n-digit numbers. By leveraging this algorithm, our scheme improves the efficiency of both aggregation and verification operations.
- We present a formal security analysis to prove that our scheme can achieve the security of position binding. Furthermore, we provide a thorough implementation, and the experiment results demonstrate that our scheme is more efficient at aggregation and verification, and at updating the proofs when appending a new value. Specifically, compared with aSVC, the proposed scheme achieves a 48× speedup when adding an element to a 16-length vector, as well as 2.13× and 1.73× speedups for aggregating eight proofs and performing verification, respectively.
1.2. Related Work
Vector commitment is a new cryptographic primitive first proposed by the authors of [,,] as an alternative to Merkle trees []. It has several attractive properties, such as compactness, constant-size proofs, and the ability to aggregate multiple proofs into a single constant-size proof. Catalano et al. [] constructed two vector commitment schemes based on the CDH and RSA assumptions. Although both can achieve the basic functions of commitment and proof, the RSA-based scheme still has room for improvement in aggregation efficiency. Lai et al. [] further studied the new features of vector commitments and proposed subvector commitments (SVCs) that support opening commitments on arbitrary subsets of positions, and its proof size is related to the number of opened elements. In order to make SVCs more efficient and suitable for distributed systems, Campanelli et al. [] proposed a new feature of vector commitments based on batch opening, namely incremental aggregation, that supports unlimited proof aggregation. This method allows the already aggregated proofs to continue to aggregate. They designed two implementations based on unknown-order groups, which are similar to the scheme proposed by Boneh et al. [], and both implement constant-size public parameters, commitments and proofs, but the authors of [] only support single-hop aggregation. Tomescu et al. proposed the aSVC [] scheme based on KZG [], which uses a polynomial method to calculate the aggregation proof, and can simultaneously realize batch opening and aggregation of proofs, but the aggregation efficiency needs to be improved. Hyperproofs proposed by Srinivasan et al. [] is also based on polynomials, but its aggregation algorithm uses the IPA [] proof system, and the actual aggregation overhead is large. In order to improve the efficiency of aggregation, Wang et al. [] proposed BalanceProofs, which takes aSVC [] as input and outputs a scheme with higher aggregation efficiency, but the aggregation efficiency of this scheme is still not ideal. In order to further optimize the efficiency of the aggregation algorithm, this paper proposes an improved scheme based on the polynomial calculation aggregation proof method, and combines the idea of the Karatsuba algorithm to implement an efficient aggregation algorithm.
In addition, the previous polynomial commitment scheme [,,,,] will incur a lot of computational overhead if the data set is to be dynamically increased. In order to meet the above requirements, this paper proposes a new vector commitment scheme, which uses a combination of Newton interpolation and the Karatsuba algorithm to construct an efficient and aggregatable vector commitment scheme for dynamic data sets.
1.3. Organization
The sections of this paper are arranged as follows: Section 1 introduces the backgound, contributions and related work. Section 2 provides the relevant tools for constructing the scheme, including Newton interpolation, Karatsuba algorithm, and bilinear pairing. Section 3 explains the construction of the proposed vector commitment scheme. Section 4 gives the security analysis of our scheme. The simulation results and discussions are presented in Section 5. Finally, the conclusion is given in Section 6.
2. Preliminaries
This section will give the required symbols and briefly introduce some preliminaries, such as Newton interpolation, bilinear map, vector commitment and Karatsuba algorithm.
Notation. Here is the mathematical notation used in this paper: let  be a security parameter,  be a negligible function, and  be any function upper-bounded by some univariate polynomial. The vector  contains n elements, where each element  [].
2.1. Newton Interpolation
Given n interpolation points , where no two  are the same, the Newton interpolation polynomial is a linear combination of Newton basis polynomial. We can express the Newton interpolation function as follows: 
      
        
      
      
      
      
    
        We denote the i-th basis polynomial of the Newton interpolating polynomials [] as
      
        
      
      
      
      
    
        where . The coefficients are defined as
      
        
      
      
      
      
    
        where  is the notation for the difference quotient, and the specific calculation process is as follows:
      
        
      
      
      
      
    
		Therefore, the Newtonian polynomials are expanded in the following form: 
      
        
      
      
      
      
    
        We can see that .
Both Newton interpolation and Lagrange interpolation are classic interpolation methods, but Newton interpolation has unique advantages. It uses the difference quotient form to gradually construct the interpolation polynomial, which has computational superiority; when a new interpolation point needs to be added, the previously calculated difference quotient result can be directly used, and only the newly added high-order difference quotient terms need to be calculated, thus avoiding the cost of complete recalculation. This progressive construction feature makes Newton interpolation particularly efficient when dealing with dynamically growing data sets. In contrast, Lagrange interpolation requires reconstructing all basis functions for each new point added.
2.2. Bilinear Pairing
We denote the parameters associated with the pairing by using . In particular,  and  are all groups of order prime p, where  is the generator of . Define e as  to be a bilinear pairing that satisfies the following properties [,,,]:
- Bilinearity: and it is .
- Non-degeneracy: .
- Computable: For all , we have an efficient algorithm to compute .
To simplify the description of the protocol, we consider  and  as the same group  and use the same generating element g.
2.3. Vector Commitment
Informally, VC allows the submission of an ordered sequence of values that can be subsequently verified against a specific position. We recall a formal definition of vector commitment in Hyperproofs [].
Definition 1 (VC). 
A VC scheme is a set of the following nine PPT algorithms:
- Gen pp: Inputting vector size n and security parameter λ outputs the public parameters.
- Commit(pp,) → (C,aux): Inputting vector outputs commitment C and auxiliary information .
- Open(pp, i,, aux) : Inputting the position index i, the vectors and outputs proof at index i.
- OpenAll(pp, ) : Inputting vector outputs proofs at all positions .
- Agg(pp,: For the aggregate set , inputting the proofs and the values outputs , which is an aggregated proof of constant size.
- Verify(pp, C, : Inputting values , commitment C and aggregate proof outputs either 0 or 1.
- UpdateCom(pp, C, : Inputting update index i, update value δ and commitment C outputs the update commitment after changing δ at position i.
- UpdateProof(pp,: Inputting update index i, update value δ, index j and proof outputs updated proof after changing δ at position i.
- UpdateAllProofs(pp, ) : Inputting update index i, update value δ, all proofs and auxiliary information outputs all updated proofs and updated auxiliary information after changing δ at position i.
Definition 2  
(VC Correctness). For any security parameter λ and ,
      
        
      
      
      
      
    
Definition 3  
(Position Binding). For any PPT adversary ,
      
        
      
      
      
      
    
Definition 4  
(Correctness of Proof Aggregation). For the security parameter λ, vector size n, vector  and any set of positions ,
      
        
      
      
      
      
    
Definition 5  
(Correctness of Commitment Update). For the security parameter λ, vector size n and vector , the update occurs at the i-th position, where , and the updated vector is :
      
        
      
      
      
      
    
Definition 6  
(Correctness of Proof Update). For the security parameter λ, the vector size n and the entire vector , the update occurs at the i-th position, where :
      
        
      
      
      
      
    
2.4. Karatsuba Algorithm
This section presents the theoretical foundations and implementation of the Karatsuba algorithm (KA) [,,]. This algorithm also makes a significant contribution to our paper.
KA was proposed by Anatolii Karatsuba [] in 1962 and represents a major advancement in computational number theory, especially in the area of large-integer multiplication. The multiplication of two n-digit numbers using traditional methods requires  single-digit multiplications. However, Karatsuba’s method reduces this to , marking a significant improvement in the efficiency of the algorithm. A notable feature of KA is its natural adaptability to recursive implementation, which enhances the versatility and efficiency of the algorithm in practical applications.
KA provides an innovative computational method for polynomial multiplication. By comparing the traditional algorithm with KA, we can deeply understand its advantages. Consider the product operation of two degree-t polynomials  and .
2.4.1. Ordinary Calculation: Degree-t Polynomials
Consider two degree-t polynomials where , i.e., each with n coefficients:
      
        
      
      
      
      
    
		  Assume , then
      
        
      
      
      
      
    
		  Then, the product  is calculated as
      
        
      
      
      
      
    
		  To obtain the polynomial , we need to compute four multiplications and one addition. Further, if , then we need to compute  multiplications and  additions.
2.4.2. Recursive KA: Polynomials of Arbitrary Degree
In this subsection, we will describe how KA can be used to implement a method for multiplying two arbitrary polynomials  and  with number of coefficients n. Consider two degree-t polynomials with  coefficients:
      
        
      
      
      
      
    
		  Assume , then
      
        
      
      
      
      
    
		  Let  be auxiliary variables with
      
        
      
      
      
      
    
		  Then, the polynomial  can be calculated in the following way:
      
        
      
      
      
      
    
We need four additions and three multiplications to compute . Compared to the Ordinary Calculation, we reduce the number of multiplication operations by one, but need to perform three additional addition operations.
Assume , then
      
        
      
      
      
      
    
		  We can calculate the following variables: 
      
        
      
      
      
      
    
		  Then, the polynomial  can be calculated in the following way:
      
        
      
      
      
      
    
The above steps are the process of multiplying two polynomials of 1-degree and 2-degree. In the following, we describe the steps of the algorithm for multiplying two polynomials of any degree. The details are described in Algorithm 1.
Defining  and  as the number of addition and multiplication operations [], respectively, the complexity of the polynomial multiplication algorithm with a coefficient number of n can be expressed as
      
        
      
      
      
      
    
		  This concludes our introduction to the KA theory, which we applied to our scheme to reduce the complexity and improve its efficiency.
          
| Algorithm 1 KA | 
| 
 | 
3. The Proposed Scheme
Vector commitment is a basic building block in cryptography and zero-knowledge proof systems. In previous schemes, we have investigated various construction methods of VC [,,,,,,,,,,,,,], for instance, based on the accumulator, Lagrangian, tree structure, etc.; however, all the above schemes follow the premise that the vector size remains unchanged. In this section, we explore a novel vector commitment scheme based on Newton’s interpolation. Similar to the previous scheme, we can create concise commitments for a given vector while maintaining an efficient aggregation and validation process. In addition, the proposed scheme can efficiently update the commitment and proofs when new vector nodes are added. The model diagram of our scheme is shown in Figure 1. The model is broadly divided into four phases, i.e., the commitment phase, the opening and validation phase, the update phase, and the addition phase.
 
      
    
    Figure 1.
      Our scheme’s model. The committer selects a vector to commit, usually a vector . The vector is transformed into a commitment C and the C is sent to the verifier. The commitment is an encrypted or hidden form that contains information about the vector. The verifier receives the commitment C, the vector value  at a location i and its location proof , and verifies that  is indeed stored at the i-th location. Additionally, our model consists of two critical phases: the Update Algorithm and the Addition Algorithm. During the Update Algorithm phase, by specifying the difference  and the corresponding update index i, the committer can update the commitment and proofs. In the Addition Algorithm phase, after inserting a new value , the committer has to update the commitment and proofs accordingly.
  
Vector commitment based on Newton interpolation.The basic principle of our scheme is similar to that of KZG [] and aSVC [], which are all based on polynomial interpolation. However, the difference is that KZG [] and aSVC [] are based on Lagrange interpolation, whereas our scheme is constructed using Newtonian polynomials. The specific formalized algorithm is as follows:
- Gen pp: It takes as input the size of the vector n and security parameter , and outputs the public parameter pp. First, it computes two groups and of order prime p for which there exists a symmetric bilinear pairing . Then, the generators and are chosen at random and generate an -tuple . Additionally, a mapping is defined to map an integer to a prime, such that . Finally, it outputs
- Commit(pp: It takes as input a vector , and generates the number of n primes by invoking for . Given n interpolation points , it computes the Newton interpolating polynomial such that . We represent . The commitment for is
- Open(pp: Upon inputting position index i, vector , it outputs proof . In particular, it calculates the following polynomial:and then the proof is . That is, for the value at the i-th position of the vector is the commitment to the polynomial .
- OpenAll(pp: Upon inputting the vector , we can call the Open algorithm to output all proofs in sequence.
- Agg(pp: Upon inputting the index set at which the proofs are to be aggregated, the set of messages corresponding with proofs , it aggregates multiple proofs into a proof of constant size for the set I. Specifically, is a commitment to the following polynomial:where satisfies for , , and is calculated as shown in Algorithm 2.Algorithm 2 MultiplyAll - Input:
- Output:
- 1:
- if then
- 2:
- Output:
- 3:
- else
- 4:
- mid =
- 5:
- left_result = MultiplyAll (mid
- 6:
- right_result = MultiplyAll (mid
- 7:
- end if
- 8:
- return = KA(left_result, right_result) =
 Similar to aSVC [], the specific form of iswhere the derivative of can be expressed as . Let ; then, our aggregate proof , and the polynomial can be computed with the help of KA in time complexity , while its derivative has computational complexity . Therefore, it is possible to obtain all in .
- Verify(pp: Upon inputting the index set I at which the proofs are to be aggregated, the set of messages , the batch proof and commitment value C, it outputs 1 iff:where , and satisfies for . When and , we can verify that passes the following equation:
- UpdateCom(pp: Upon inputting the original commitment value C, the updated index i, and the difference at the updated index, it calculates the new interpolation polynomial , where is the interpolation polynomial coefficient, and outputs the new commitment value .
- UpdateAllProofs(pp: Upon inputting the index i at the update and difference between message update , it can calculate the updated Newton interpolation polynomial, and output all proofs by calling it OpenAll.
- UpdateProof(pp: Upon inputting the index i of the update location, the message update difference , the index j and the proof , calculate the updated Newton interpolation polynomial, call the algorithm Open, and output the updated proof to reflect the message at position i changing by .
- AddCom(pp: Input the original commitment value C and the vector after adding the node, where l represents the number of nodes we want to add. Call Gen to obtain the new public parameter .where . Compute the new difference quotient values , and we can obtain a new polynomial . Output
- AddProof: Whenever we add a new vector node, the original proof changes. Entering the index i of the newly added node and adding the difference quotient value requires updating the proof . Add a new node and the interpolating polynomial changes as follows:At this point, the quotient polynomial of our computational proofs changes as follows: ifStore in the public parameter as the update parameter, then . Otherwise, we need to call the algorithm the Open( algorithm to calculate the proof at position .
- AddAllProof: Input the index i of the added node and the value of the added difference quotient. If , call the algorithm Open(, where . If , return .
The above algorithm introduces the specific algorithm construction of the vector commitment scheme based on Newton interpolation polynomial in detail. Compared with the traditional Lagrangian-based vector commitment scheme construction, our scheme innovatively introduces a dynamic node addition mechanism, breaks through the limitation of fixed dimension and enables the vector scale to be flexibly expanded. And in Section 5, its performance is comprehensively evaluated through experiments. The experimental results show that this scheme achieves more flexible dynamic characteristics while maintaining computational efficiency.
4. Security Analysis
4.1. Assumptions
In this section, the soundness for our scheme is validated based on the following assumptions.
Assumption 1  
(t-Strong Diffie–Hellman (t-SDH) []). Selecting  uniformly at random, provided the input -tuple , against any adversary , we define the condition for any  as follows:
      
        
      
      
      
      
    
Assumption 2  
(t-Strong Bilinear Diffie–Hellman (t-SBDH) [,]). Selecting  uniformly at random, provided the input -tuple , against any adversary , we define the condition for any  as follows:
      
        
      
      
      
      
    For the above assumptions, they will be used to prove the soundness for our scheme.
4.2. Security Proof
This section will prove the soundness of our scheme by the following lemmas. To prove the soundness of the scheme, we use the counterfactual idea that if there exists an adversary  who successfully attacks the soundness of our scheme, then let us show how to construct an adversary  to violate the above assumptions. We assume that the adversary  returns an individual proof, and then returns an aggregated proof.
Lemma 1  
(Soundness of Individual Proof). The individual proof of our scheme is sound under t-SDH (see Assumption 1):
      
        
      
      
      
      
    
Proof.  
First, suppose that  obtains the t-SDH parameter .  guesses the forged index i of  with probability  ( is a security parameter). Subsequently,  adapts the SDH public parameters to the protocol public parameters and devises the equation , where  is chosen randomly. Finally,  calls  using the adjusted public parameters as input.  should output the forged index i, the commitment C, and the different proofs  at the same index i.
      
        
      
      
      
      
    
		  Dividing the two equations gives the following result:
      
        
      
      
      
      
    
		  Substituting  into the above equation yields:
      
        
      
      
      
      
    
		  Organizing the above equation, we finally obtain
      
        
      
      
      
      
    
          which breaks the t-SDH. Then, we present the soundness lemma for aggregated proof.  □
Lemma 2  
(Soundness of Aggregated Proof). Aggregated Proof of our scheme is sound under t-SBDH (see Assumption 2). For the security parameter λ, and , where I is defined in Section 3, in the same way, we define :
      
        
      
      
      
      
    
Proof.  
We construct the adversary  to break the t-SBDH hypothesis as an illustration of the contradiction that would arise if there existed an adversary  that could break Lemma 2. The procedure is as follows:  first predicts the index i of the  forgery, where the index i is the intersection of the two sets of positions . Secondly,  adjusts the SBDH public parameters to the protocol public parameters by crafting the equation such that , where  is chosen randomly. Finally,  calls  using the adjusted public parameters as input.  should output two index sets , the commitment C, two aggregated proofs  and two polynomials . Let , and similarly, . Then, the following condition holds:
      
        
      
      
      
      
    
		  Dividing the two equations gives the following result:
      
        
      
      
      
      
    
		  Let  and . We can organize  as . Similarly, . After organizing, we can obtain the following equation:
      
        
      
      
      
      
    
		  We can decompose  from , thus obtaining , and similarly, . Substituting this into the above equation and organizing it yields the following equation:
      
        
      
      
      
      
    
		  Substituting  into the above equation yields:
      
        
      
      
      
      
    
		  Take out  from the above equation and continue to rearrange the equation:
      
        
      
      
      
      
    
		  Finally, to obtain the following equation, let :
      
        
      
      
      
      
    
          which breaks the t-SBDH assumption, given that commitments to  can be directly reconstructed using .  □
5. Experimental Evaluations
This section analyzes the performance of variable commitment schemes. We implemented the above algorithms in Python and chose the BLS12-381 curve on the py-ecc library, which is a pairing-friendly elliptic curve and an elliptic curve for polynomial commitments that provides 128-bit security. For the hardware device on which the algorithm is implemented, we use a 12th Gen lntel (R) core (TM) i5-124000 processor, which operates at a frequency of 2.5 GHz, 16 GB of RAM.
Comparison. Figure 2 shows a performance comparison experiment between the commitment scheme proposed in Section 3 and aSVC []. To ensure the fairness of the experiments, both schemes run on the same hardware platform and both use the BLS12-381 elliptic curve parameters. In the experiments, we obtained the source code of aSVC from GitHub, and also evaluated the computational efficiency of the two schemes in Python environment to obtain objective performance data. The experimental results show the performance of the two schemes in terms of time overhead for different vector lengths (i.e., ).
 
      
    
    Figure 2.
      Performance comparison. (a) The time required to update all the proofs against aSVC and our scheme at different vector lengths; (b) the time required to aggregate some of the proofs against aSVC and our scheme with different vector lengths; (c) the time required to verify the aggregated proofs against aSVC and our scheme with different vector lengths; and (d) the time required to update all proofs at different vector lengths for aSVC and our scheme after adding nodes.
  
UpdateAllProofs. The experimental results shown in Figure 2a indicate that, in terms of updating all proofs, the aSVC [] approach exhibits superior time efficiency across various vector lengths compared to our proposed scheme. This discrepancy stems from the fact that our scheme directly invokes the OpenAll algorithm, resulting in a higher computational complexity. Therefore, improving the efficiency of proof-updating in our scheme is the aim of our future work.
Aggregation. Figure 2b shows the efficiency of proof aggregation. We fixed the number of aggregated proofs at eight, and the report the time efficiency across various vector lengths. By employing the Karatsuba algorithm, our scheme significantly reduced the time overhead of the aggregation process. The results show that the time overhead for the aggregation algorithm in aSVC is approximately 2.13× higher than that in our scheme. This significant reduction highlights the practical benefits of our scheme.
Verification. Figure 2c presents the comparative performance metrics between our scheme and aSVC [] during the verification phase of aggregated proofs. By integrating the Karatsuba algorithm into the verification process, the proposed approach significantly improves verification efficiency. Experimental results reveal that the time overhead for the verification algorithm in aSVC is approximately 1.73× higher than that in our scheme. The results show that this significant reduction highlights the practical benefits of our scheme.
AddAllProofs. Figure 2d depicts the time overhead incurred when updating all proofs after adding a vector node across different vector lengths. The results demonstrate that the time efficiency of our scheme is significantly better than that of aSVC. This is due to the fact that the aSVC scheme uses Fast Fourier Transform and Lagrange interpolation algorithms, which are closely related to the length of the vectors, and this feature implies that when adding a new vector node, the aSVC has to call the OpenAll algorithm to recalculate all the existing proofs. In contrast, our scheme uses an incremental vector node construction method, i.e., when adding a new vector node, only the incremental portion needs to be computed to achieve incremental updating of the proofs, without having to call the OpenAll algorithm to recompute all the proofs. This design reduces the computational overhead of the proof updating process and can greatly reduce the consumption of computational resources in practical applications.
6. Conclusions
In this paper, we propose a novel aggregatable subvector commitment scheme based on Newton interpolation, which can effectively support the addition of new elements. Specifically, the proposed scheme allows for the incremental updating of commitments and proofs for each position, avoiding the requirement of full recomputation, and thus, reducing the computational overhead. In addition, we employed the Karatsuba algorithm (KA) to efficiently perform large-integer multiplication, which improves the efficiency of proof aggregation and verification. However, the efficiency in updating proofs when modifying elements still needs to be improved. In future work, our research direction will further optimize the updating efficiency, which will directly contribute to the widespread deployment of vector commitment techniques in practical applications.
Author Contributions
Conceptualization, All authors; methodology, Q.X. and Y.W.; software, Q.X. and Y.W.; validation, Q.X. and Y.W.; formal analysis, Q.X. and Y.W.; investigation, all authors; resources, Q.X. and Y.W.; writing—original draft preparation, Q.X.; writing—review and editing, Y.W.; supervision, Q.X. and C.G. All authors have read and agreed to the published version of the manuscript.
Funding
This work is supported by the National Key Research and Development Program of China (Grant No. 2022YFB2701500), the National Natural Science Foundation of China (Grant No. 62102313), and the Shaanxi Distinguished Youth Project (Grant No. 2022JC-47).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The original contributions presented in this study are included in the article, further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Kate, A.; Zaverucha, G.M.; Goldberg, I. Constant-size commitments to polynomials and their applications. In Proceedings of the Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5–9 December 2010; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2010; pp. 177–194. [Google Scholar]
- Catalano, D.; Fiore, D. Vector commitments and their applications. In Proceedings of the Public-Key Cryptography–PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, 26 February–1 March 2013; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2013; pp. 55–72. [Google Scholar]
- Tomescu, A.; Abraham, I.; Buterin, V.; Drake, J.; Feist, D.; Khovratovich, D. Aggregatable subvector commitments for stateless cryptocurrencies. In Proceedings of the International Conference on Security and Cryptography for Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 45–64. [Google Scholar]
- Gorbunov, S.; Reyzin, L.; Wee, H.; Zhang, Z. Pointproofs: Aggregating proofs for multiple vector commitments. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual, 9–13 November 2020; pp. 2007–2023. [Google Scholar]
- Srinivasan, S.; Chepurnoy, A.; Papamanthou, C.; Tomescu, A.; Zhang, Y. Hyperproofs: Aggregating and maintaining proofs in vector commitments. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 3001–3018. [Google Scholar]
- Wang, W.; Ulichney, A.; Papamanthou, C. {BalanceProofs}: Maintainable vector commitments with fast aggregation. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 4409–4426. [Google Scholar]
- Liu, J.; Zhang, L.F. Matproofs: Maintainable matrix commitment with efficient aggregation. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 2041–2054. [Google Scholar]
- Lai, R.W.; Malavolta, G. Subvector commitments with application to succinct arguments. In Proceedings of the Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; Proceedings, Part I 39. Springer: Berlin/Heidelberg, Germany, 2019; pp. 530–560. [Google Scholar]
- Campanelli, M.; Fiore, D.; Greco, N.; Kolonelos, D.; Nizzardo, L. Incrementally aggregatable vector commitments and applications to verifiable decentralized storage. In Proceedings of the Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Republic of Korea, 7–11 December 2020; Proceedings, Part II 26. Springer: Berlin/Heidelberg, Germany, 2020; pp. 3–35. [Google Scholar]
- Boneh, D.; Bünz, B.; Fisch, B. Batching techniques for accumulators with applications to IOPs and stateless blockchains. In Proceedings of the Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; Proceedings, Part I 39. Springer: Berlin/Heidelberg, Germany, 2019; pp. 561–586. [Google Scholar]
- Kate, A.; Zaverucha, G.M.; Goldberg, I. Polynomial Commitments. Technical Report 2010. Available online: https://www.researchgate.net/publication/228888344_Polynomial_Commitments (accessed on 5 January 2025).
- Tas, E.N.; Boneh, D. Vector Commitments with Efficient Updates. arXiv 2024, arXiv:2307.04085. [Google Scholar]
- Acharya, O.; Baldimtsi, F.; Gordon, S.D.; McVicker, D.; Yadav, A. Universal Vector Commitments; Springer: Berlin/Heidelberg, Germany, 2024; pp. 161–181. [Google Scholar]
- Libert, B. Vector Commitments with Proofs of Smallness: Short Range Proofs and More. In Proceedings of the IACR International Conference on Public-Key Cryptography, Sydney, Australia, 15–17 April 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 36–67. [Google Scholar]
- Libert, B.; Yung, M. Concise mercurial vector commitments and independent zero-knowledge sets with short proofs. In Proceedings of the Theory of Cryptography Conference; Springer: Berlin/Heidelberg, Germany, 2010; pp. 499–517. [Google Scholar]
- Catalano, D.; Fiore, D.; Messina, M. Zero-knowledge sets with short proofs. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2008; pp. 433–450. [Google Scholar]
- Wang, Q.; Zhou, F.; Xu, J.; Xu, Z. A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications. Comput. J. 2020, 63, 633–647. [Google Scholar] [CrossRef]
- Merkle, R.C. A digital signature based on a conventional encryption function. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1987; pp. 369–378. [Google Scholar]
- Bünz, B.; Maller, M.; Mishra, P.; Tyagi, N.; Vesely, P. Proofs for inner pairing products and applications. In Proceedings of the Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 6–10 December 2021; Proceedings, Part III 27. Springer: Berlin/Heidelberg, Germany, 2021; pp. 65–97. [Google Scholar]
- Von zur Gathen, J.; Gerhard, J. Fast multiplication. In Modern Computer Algebra; Cambridge University Press: Cambridge, UK, 2013; pp. 221–254. [Google Scholar]
- Newton Polynomial. Available online: https://encyclopedia.thefreedictionary.com/Newton+polynomial (accessed on 5 January 2025).
- Joux, A. A one round protocol for tripartite Diffie–Hellman. In Proceedings of the International Algorithmic Number Theory Symposium; Springer: Berlin/Heidelberg, Germany, 2000; pp. 385–393. [Google Scholar]
- Menezes, A.; Vanstone, S.; Okamoto, T. Reducing elliptic curve logarithms to logarithms in a finite field. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, New Orleans, LA, USA, 6–8 May 1991; pp. 80–89. [Google Scholar]
- Enge, A. Bilinear pairings on elliptic curves. arXiv 2014, arXiv:1301.5520v2. [Google Scholar] [CrossRef]
- Meert, D. Bilinear Pairings in Cryptography; Radboud Universiteit Nijmegen: Nijmegen, The Netherlands, 2009; pp. 22–82. [Google Scholar]
- Weimerskirch, A.; Paar, C. Generalizations of the Karatsuba algorithm for efficient implementations. Cryptol. ePrint Arch. 2006, 2006, 224. [Google Scholar]
- Karatsuba, A.A. The complexity of computations. Proc. Steklov Inst. Math.-Interperiodica Transl. 1995, 211, 169–183. [Google Scholar]
- Karatsuba, A. Multiplication of multidigit numbers on automata. In Proceedings of the Soviet Physics Doklady; American Institute of Physics: College Park, MD, USA, 1963; Volume 7, pp. 595–596. [Google Scholar]
- Boneh, D.; Boyen, X. Short signatures without random oracles. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2004; pp. 56–73. [Google Scholar]
- Papamanthou, C.; Shi, E.; Tamassia, R. Signatures of correct computation. In Proceedings of the Theory of Cryptography Conference; Springer: Berlin/Heidelberg, Germany, 2013; pp. 222–242. [Google Scholar]
- Guo, F.; Mu, Y.; Chen, Z. Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. In Proceedings of the International Conference on Pairing-Based Cryptography; Springer: Berlin/Heidelberg, Germany, 2007; pp. 392–406. [Google Scholar]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. | 
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
