Back to Explorer
Research PaperResearchia:202602.20011[Computer Science > Cybersecurity]

Non-Trivial Zero-Knowledge Implies One-Way Functions

Suvradip Chakraborty

Abstract

A recent breakthrough [Hirahara and Nanashima, STOC'2024] established that if NP⊈ioP/poly\mathsf{NP} \not \subseteq \mathsf{ioP/poly}, the existence of zero-knowledge with negligible errors for NP\mathsf{NP} implies the existence of one-way functions (OWFs). In this work, we obtain a characterization of one-way functions from the worst-case complexity of zero-knowledge {\em in the high-error regime}. We say that a zero-knowledge argument is {\em non-trivial} if the sum of its completeness, soundness and zero-knowledge errors is bounded away from 11. Our results are as follows, assuming NP⊈ioP/poly\mathsf{NP} \not \subseteq \mathsf{ioP/poly}: 1. {\em Non-trivial} Non-Interactive ZK (NIZK) arguments for NP\mathsf{NP} imply the existence of OWFs. Using known amplification techniques, this result also provides an unconditional transformation from weak to standard NIZK proofs for all meaningful error parameters. 2. We also generalize to the interactive setting: {\em Non-trivial} constant-round public-coin zero-knowledge arguments for NP\mathsf{NP} imply the existence of OWFs, and therefore also (standard) four-message zero-knowledge arguments for NP\mathsf{NP}. Prior to this work, one-way functions could be obtained from NIZKs that had constant zero-knowledge error εzkε_{zk} and soundness error εsε_{s} satisfying εzk+εs<1ε_{zk} + \sqrt{ε_{s}} < 1 [Chakraborty, Hulett and Khurana, CRYPTO'2025]. However, the regime where εzk+εs1ε_{zk} + \sqrt{ε_{s}} \geq 1 remained open. This work closes the gap, and obtains new implications in the interactive setting. Our results and techniques could be useful stepping stones in the quest to construct one-way functions from worst-case hardness.


Source: arXiv:2602.17651v1 - http://arxiv.org/abs/2602.17651v1 PDF: https://arxiv.org/pdf/2602.17651v1 Original Link: http://arxiv.org/abs/2602.17651v1

Submission:2/20/2026
Comments:0 comments
Subjects:Cybersecurity; Computer Science
Original Source:
View Original PDF
arXiv: This paper is hosted on arXiv, an open-access repository
Was this helpful?

Discussion (0)

Please sign in to join the discussion.

No comments yet. Be the first to share your thoughts!