Jaeschke, G. (1993). On strong pseudoprimes to several
bases. Mathematics of Computation, 61(204):915–
926.
Kranakis, E. (2013). Primality and cryptography. Springer-
Verlag.
Lehmann, D. J. (1982). On primality tests. SIAM Journal
on Computing, 11(2):374–375.
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A.
(2018). Handbook of applied cryptography. CRC
press.
Micali, S., Rabin, M., and Vadhan, S. (1999). Verifiable
random functions. In 40th annual symposium on foun-
dations of computer science (cat. No. 99CB37039),
pages 120–130. IEEE.
Naor, M. and Reingold, O. (1997). Number-theoretic con-
structions of efficient pseudo-random functions. In
Proceedings 38th Annual Symposium on Foundations
of Computer Science, pages 458–467. IEEE.
Ozdemir, A., Wahby, R., Whitehat, B., and Boneh, D.
(2020). Scaling verifiable computation using efficient
set accumulators. In 29th USENIX Security Sympo-
sium (USENIX Security 20), pages 2075–2092.
Pomerance, C., Selfridge, J. L., and Wagstaff, S. S. (1980).
The pseudoprimes to 25 · 10
9
. Mathematics of Com-
putation, 35(151):1003–1026.
APPENDIX
We offer proof sketches for the theorems presented in
the paper. The full version of this paper contains the
corresponding proofs.
Miller Primality Predicate. Let us consider the
proof sketch for Theorem 8:
Proof Sketch. The proof is based on the zero-
knowledge properties of the underlying predicates.
Using standard techniques a knowledge extractor can
extract integers for the secrets in the protocol. Given
that the discrete-logarithm problem in G is assumed
hard and provided that the log
g
h is unknown, then the
equations encoded on generator g hold in the expo-
nent (mod Q). The knowledge extractor gains the
integer ˆn and integers ˆu and ˆe for which it establishes
the relation ˆn −1 = 2
ˆe
ˆu and that ˆu is odd. The knowl-
edge extractor gains bases ( ˆa
j
)
t
j=1
. We are interested
which relations hold for these extracted secrets, espe-
cially the Miller primality relations ˆa
ˆu
j
≡
ˆ
d
j
(mod ˆn)
and ˆa
2
ˆ
k
j
ˆu
j
≡
ˆ
d
0
j
(mod ˆn). That these relations hold
in zero-knowledge follows from Theorem 5.
ˆ
d
j
= 1
and
ˆ
d
0
j
= −1 is established with standard techniques.
Finally, we have that ˆn < 2
˙
`
n
< n
∗
, where n
∗
is the
least integer such that spsp
( ˆa
j
)
t
j=1
,n
∗
. Therefore,
ˆn fulfilling the established relations must be prime.
The primality relation established by the extracted se-
crets are deterministic. Therefore the soundness error
probability is 2
−k
, gained from the number of zero-
knowledge proof rounds k.
Pocklington Primality Witness. The proof sketch
for Theorem 9 is as follows:
Proof Sketch. With standard techniques the knowl-
edge extractor extracts integers for the secrets in the
protocol. Assuming the hardness of the discrete log-
arithm and that log
g
h is unknown, equations encoded
on g hold in the exponent (mod Q). Especially, it
gains ˆp
j−1
, ˆr
j
, ˆp
j
, and ˆa
j
. In the relations it is as-
sured that ˆr
j
and ˆa
j
are positive and that ˆr
j
< ˆp
j
.
Thereby, the conditions for the Pocklington criterion
named in Theorem 4 are fulfilled. Two aspects re-
main to show: First, ˆa
ˆp·ˆr
≡ 1 (mod ˆp
0
j
), which fol-
lows from Theorem 5 and the standard comparison
of
ˆ
d with 1. Second, gcd( ˆa
ˆr
i
− 1, ˆp
i
) is shown with
the predicate (gcd(x, y) = 1). Provided that ˆp
j−1
is
prime and that these two relations have been estab-
lished, by ˆp
j
is prime by Theorem 4. The soundness
error probability of 2
−k
stems from the k rounds of
the zero-knowledge proof.
Special RSA Modulus. We sketch the proof for
Theorem 10:
Proof Sketch. It is standard to construct knowledge
extractors for the given protocol and to establish the
relation between the secrets showing that the follow-
ing relations between extracted integers hold hold:
ˆp = 2
˜
ˆp + 1, ˆq = 2
˜
ˆq +1, and ˆn = ˆp ˆq.
The primality of ( ˆp − 1)/2 and ( ˆq − 1)/2 is estab-
lished as a zero-knowledge argument governed by
Theorem 6, yielding a soundness error probability of
2
−k
+ 2
−t
with t being the number of Lehmann pri-
mality bases employed. The primality of ˆp and ˆq is
given by the Pocklington witness zero-knowledge ar-
gument established in Theorem 9. The latter proven
with one base only per predicate and has a soundness
error probability of 2
k
.
Secret Hash-to-Prime. Let us consider the proof
sketch for the Theorems 11 and 12.
Proof Sketch. For the secrets derived by the knowl-
edge extractor, the Theorems 6, 8, and 9 govern
that the committed integer ˆp
x
is indeed prime with
a primality soundness error probability of at most
2
−t
. Furthermore, proof predicates
µ = H
ζ,β
(ν)
and
Hashing to Prime in Zero-Knowledge
73