### Abstract

We give a general reduction that converts any public-coin interactive proof into a one-round (two-message) argument. The reduction relies on a method proposed by Aiello et al. [1], of using a Private-Information-Retrieval (PIR) scheme to collapse rounds in interactive protocols. For example, the reduction implies that for any security parameter t, the membership in any language in PSPACE can be proved by a one-round (two-message) argument of size poly(n,t), which is sound for malicious provers of size 2 ^{t}. (Note that the honest prover in this construction runs in exponential time, since she has to prove membership in PSPACE, but we can choose t such that 2 ^{t} is significantly larger than the running time of the honest prover). A probabilistically checkable argument (PCA) is a relaxation of the notion of probabilistically checkable proof (PCP). It is defined analogously to PCP, except that the soundness property is required to hold only computationally. We consider the model where the argument is of one round (two-message), where the verifier's message depends only on his (private) randomness. We show that for membership in many NP languages, there are PCAs (with efficient honest provers) that are of size polynomial in the size of the witness. This compares to the best PCPs that are of size polynomial in the size of the instance (that may be significantly larger). The number of queries to these PCAs is poly-logarithmic. The soundness property, in all our results, relies on exponential hardness assumptions for PIR schemes.

Original language | English (US) |
---|---|

Title of host publication | Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings |

Pages | 143-159 |

Number of pages | 17 |

DOIs | |

State | Published - Oct 29 2009 |

Externally published | Yes |

Event | 29th Annual International Cryptology Conference, CRYPTO 2009 - Santa Barbara, CA, United States Duration: Aug 16 2009 → Aug 20 2009 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 5677 LNCS |

ISSN (Print) | 0302-9743 |

ISSN (Electronic) | 1611-3349 |

### Other

Other | 29th Annual International Cryptology Conference, CRYPTO 2009 |
---|---|

Country | United States |

City | Santa Barbara, CA |

Period | 8/16/09 → 8/20/09 |

### All Science Journal Classification (ASJC) codes

- Theoretical Computer Science
- Computer Science(all)

## Fingerprint Dive into the research topics of 'Probabilistically checkable arguments'. Together they form a unique fingerprint.

## Cite this

*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings*(pp. 143-159). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5677 LNCS). https://doi.org/10.1007/978-3-642-03356-8_9