All but one vector commitment is used to create a VOLE Correlation. All but one element of the binary tree can be conveyed to the other party.
The tree is constructed starting from a random seed of the root node, and the value of each leaf node is expanded by the PRG and hash function to two values, a seed and a commitment . Then the final seed is computed as .γIn other words, N-1 seeds are committed to .
The overall algorithm is as follows
- Prover generates and computes using PRG and H0,H1.
- Verifier sends challenge j (index of seed) to Prover
- Prover sends , , and siblings to Verifier
- Verifier computes each from the received siblings
- input received in step 3 and each commitment calculated in step 4 into H1
- Verifier check that the output value of H1 matches the received in step 3
Example of j=3
- Prover generates r and calculates h_com using PRG and H0,H1. This is a N-seeds commit
- Verifier sends challenge(= 3) to Prover
- Prover sends ,, and siblings() to Verifier
- Verifier computes each Com_i(i=j) from the received siblings : : :
- Enter the received in step 3 and each of the commitments calculated in step 4 together in H1. output = H1(com1~com7)
- Verifier checks that the output value of H1 matches the received in step 3
This vector commitment is repeated multiple times to prepare the number of VOLE correlations needed to evaluate the circuit.
the next step is to convert each vector commitment into a length-l, VOLE correlation.